SlideShare a Scribd company logo
1 of 20
A Seminar on
The cyber crime threat on
mobile devices
Delivered by
Mr. Faisal A. Amdani
BNCOE, Pusad,
amdanifaisal@yahoo.com
Mr. Aditya C. Kokadwar
BNCOE, Pusad,
aditya.kokadwar@gmail.com
B.N.College of Engineering, Pusad (M.S.)
Sr.No. Topic
Abstract
1. Introduction – mobile devices
2 What is Cyber Crime
3 The Cyber Security Landscape
3.1 Threats
3.2 Network Security
3.3 System Security
4 Preventive Measures to Oppose Cyber Crime
5 Conclusion
References
CONTENTS
Introduction
A wide range of mobile devices are in use today, including (smart)
phones, media players, tablets, and notebook PCs.
Road vehicles of all kinds (cars, lorries, etc.), RFID tags embedded in all
sorts of devices, chip-based payment cards, and public transport vehicles. Of
course, these are just the mobile devices – many everyday fixed objects are
also rapidly becoming Internet connected, including ‘smart’ buildings, e.g.
shops, restaurants, homes, and workplaces, and installations within buildings,
The main cyber (and hence cyber crime) threats to mobile devices are
reviewed. We then look at how these threats apply to some of the less well-
studied classes of mobile device.
One reason for problems in all categories of mobile devices and systems is
that systems have evolved piecemeal, and there is no overall security
architecture.
What is Cyber Crime
Cyber crime is regarded as computer-mediated activities
which are either illegal or considered illicit by certain parties
and which can be conducted through global electronic
networks. Cybercrimes describe criminal activity in which
the computer or network is a necessary part of the crime”
From the definition it is obvious that the computer and
mobile devices are the major source of cyber crime.
•Govel (2007) said it “has proven to be accurate, easy, and
reliable; detection has posed constraints in preventing cyber
crime.
The cyber security landscape
• Following are the cyber security landscape
• Threats
• Network security
• System security
Threats
• Cyber threats to mobile devices can be divided into two main
classes.
• Communications-based threats include access network
impersonation, mobile device impersonation, and man-in-the-
middle attacks (both active and passive).
Threats
• System-based threats include software vulnerabilities, side
channel attacks, and social engineering attacks (including
malicious applications).
Figure social engineering attacks
Threats
• Within a system we can employ a range of techniques,
including: secure software design (to reduce the need to
patch vulnerabilities), attack surface reduction (to reduce the
impact of vulnerabilities), secure hardware/firmware design
(to make finding side channel attacks difficult), careful user
interface design (to reduce the risk of user error), and user
education regarding threats.
Network security
Some currently deployed network access protocols offer very limited
security. For example, authentication of the ‘access network’ to the device
is sometimes non-existent, e.g. as in GSM and IEEE 802.11 Wi-Fi.
This situation has given rise to a series of public domain
implementations of ‘fake network’ attacks on GSM and IEEE 802.11, as
well as attacks arising from compromised access points, where the
compromise might arise from software or hardware attack.
Pair-wise device authentication can also be vulnerable; for example
the original Bluetooth pairing scheme was rather weak. In general, as a
result of the lack of comprehensive and integrated security solutions for
mobile connected devices, there is an ever-growing risk of widespread
malware attacks, as devices become more ‘smart’ and flexible.
System security
System security problems with mobile devices have been known for
some time.
For example, the Register reported back in February 2007 that,
according to McAfee, 3G malware attacks in mobile networks had
reached a new high.
Informa had reported that 83% of mobile operators were hit by mobile
device infections in 2006, and the number of reported security incidents in
2006 was more than five times as high as in 2005. Even five years ago,
200 strains of mobile malware had been discovered.
Since then the situation has got much worse, as more recent reports
show. For example:
System security
Bloomberg reported8 in April 2011 that, according to Kaspersky, the
‘Android mobile-phone platform faces soaring software attacks and has
little control over ... applications. [Kaspersky] identified 70 different types
of malware in March, [an increase] from just two categories in September’.
Wyatt, in ‘The Lookout Blog’, reported in May 2011 that ‘multiple
applications available in the official Android Market were found to contain
malware that can compromise a significant amount of personal data.
Likely created by the same developers who brought DroidDream to
market back in March, 26 applications were found to be infected with a
stripped down version of DroidDream [called] ‘DroidDreamLight’. At this
point we believe between 30,000 and 120,000 users have been affected by
DroidDreamLight’. A Sophos report from November 2009-10 reports on a
range of iPhone malware.
Preventive Measures to Oppose
Cyber Crime
•Reduce Opportunities Reduce Opportunities to the Criminals Develop
elaborate system design so that hacker does not hack the mobile.
•Use Authentication Technology Use password bio-metric devices, finger
print or voice recognition technology and retinal imaging, greatly immense the
difficulty of obtaining unauthorized access to information systems. Attention to
be paid to bio-metric technology as this recognizes the particular user’s
authentication for using the particular devices.
•Develop New Technology Develop Technology of encryption and anonymity
and also for protecting infrastructure as hackers or cyber terrorists can attack
over any nation’s infrastructure resulting in massive losses.
.
Preventive Measures to Oppose
Cyber Crime
•Understand Cyber Crime For volume, impact and legal challenges.
Understand the benefit of proper equipment training and tools to control
cyber crime.
•Think about Nature of Crime Computer crime is diverse, a deep
thought to be given, what cyber crime can take place in one’s particular
organization, so that different types of monitoring/security system can be
designed and proper documentation can be written for security system.
•Adopt Computer Security Avail new sophisticated products and
advice for computer crime prevention which is available free or paid in
the market
Preventive Measures to Oppose
Cyber Crime
•Use Blocking and Filtering Programs For detecting virus, since virus
can identify and block malicious computer code. Anti Spyware software
helps stopping the criminals from taking hold of one’s PC and helps to
cleanup the PC if the same has been hit.
•Monitoring Controls Separate monitoring to be done for (a) Monetary
files (b) Business information.
•Design Different Tools For different needs rather than using one
particular tool.
•Data Recovery Develop tools for data recovery and analysis
•Reporting Always report the crime to cyber fraud complaint center in
one’s country as they maintain huge data and have better tools for
controlling cyber crime.
Preventive Measures to Oppose
Cyber Crime
•Design Alert Systems Design the alert system when there is actual
intrusion.
•Install Firewalls (a) As they block particular network traffic according to
security policy. (b) Patches are generally installed automatically and
automatically fixes the software security flaws.
•Install Original Software As they contain many security measures. Pirated
software’s do not contain many security abilities which exist in the original
software.
•Online Assistance Develop regular online assistance to employees. Learn
Internet to one’s advantage only and understand all tips to stay online safe.
Preventive Measures to Oppose
Cyber Crime
•Avoid Infection Avoid infection rather than cleaning it afterwards keep
browser up to date for security measures.
•Avoid bogus Security Products As many anti-spyware activists’ runs a
website that list bogus security products. Read the license agreement
before installing any program.
•Attachments Avoid opening attachments or e-mails which were not
expecting and have come from unknown source or person.
•Cross Check Cross check regularly the statements of financial accounts
and internet banking.
Conclusion
The problems with cyber crime; how to improve efforts of prevention;
and the response to cybercrime are what help us to look at the dangers of
cyber space. The Internet is a very powerful tool and effective means of
communication but it is vulnerable just like anything else. The way to
protect it for now is for everyone to be smart and follow preventive
measures; individuals, institutions, and government alike should all follow
these measures. We have seen the actions of the government and what
bots and viruses are capable of and it is important that security measures
be implemented. In response to these issues there have been requests from
the WGIG as well as congress to implement more standards and laws to
help minimize cyber crime. In response to some problems there have been
efforts by some nations by arresting individuals and The Lack of
Attention in the Prevention of Cyber crime and How to Improve it 27
groups that commit cyber crimes like the ones discussed earlier. If
everyone does their part, not only will they be safer but it will be setting
an example for others as well as making it more difficult for hackers to
cause damage.
References
[1] E. Barkan, E. Biham, and N. Keller, ‘Instant Ciphertext-Only Cryptanalysis
of GSM Encrypted Communication’. Journal of Cryptology 21(3) (2008) 392-
429.
[2] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage,
K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, ‘Comprehensive
Experimental Analyses of Automotive Attack Surfaces’. In: D. Wagner (ed.),
Proceedings of USENIX Security 2011, USENIX (2011).
[3] B. Driessen, ‘Eavesdropping on satellite telecommunication systems’. Draft
of February 8th 2012.
[4] S. R. Fluhrer, I. Mantin, and A. Shamir, ‘Weaknesses in the Key Scheduling
Algorithm of RC4’. In: Proc. Selected Areas in Cryptography 2001, Springer
(2001) pp.1-24.
[5] Acohido, B. (2007, June 14). Cyber crime arrests by FBI 'A tiny drop in the
bucket'. (Final
Edition).
References
[6] Cyber Security Industry Alliance. (2005). National Agenda for
Information Security 2006.
Virginia: Cyber Security Alliance.
[7] Emke, J. (2008). Trends and Shocks, and the Impact of the
Acquisition Community. Defense
AT&L , 37 (1), 3.
[8] Furnell, S. (2002). Cyber crime: Vandalizing the Information
Society. Boston, MA, USA:
Addison Wesley.
Gibson, S. (2006). Stepping up the Effort to Beat Cyber-Crime.
Eweek.com.
Thanking You !

More Related Content

What's hot

Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentationMuhammadHossen
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
it act
it actit act
it act
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 

Similar to Cyber crime

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 

Similar to Cyber crime (20)

C018131821
C018131821C018131821
C018131821
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Ijetr042177
Ijetr042177Ijetr042177
Ijetr042177
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

Cyber crime

  • 1. A Seminar on The cyber crime threat on mobile devices Delivered by Mr. Faisal A. Amdani BNCOE, Pusad, amdanifaisal@yahoo.com Mr. Aditya C. Kokadwar BNCOE, Pusad, aditya.kokadwar@gmail.com B.N.College of Engineering, Pusad (M.S.)
  • 2. Sr.No. Topic Abstract 1. Introduction – mobile devices 2 What is Cyber Crime 3 The Cyber Security Landscape 3.1 Threats 3.2 Network Security 3.3 System Security 4 Preventive Measures to Oppose Cyber Crime 5 Conclusion References CONTENTS
  • 3. Introduction A wide range of mobile devices are in use today, including (smart) phones, media players, tablets, and notebook PCs. Road vehicles of all kinds (cars, lorries, etc.), RFID tags embedded in all sorts of devices, chip-based payment cards, and public transport vehicles. Of course, these are just the mobile devices – many everyday fixed objects are also rapidly becoming Internet connected, including ‘smart’ buildings, e.g. shops, restaurants, homes, and workplaces, and installations within buildings, The main cyber (and hence cyber crime) threats to mobile devices are reviewed. We then look at how these threats apply to some of the less well- studied classes of mobile device. One reason for problems in all categories of mobile devices and systems is that systems have evolved piecemeal, and there is no overall security architecture.
  • 4. What is Cyber Crime Cyber crime is regarded as computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks. Cybercrimes describe criminal activity in which the computer or network is a necessary part of the crime” From the definition it is obvious that the computer and mobile devices are the major source of cyber crime. •Govel (2007) said it “has proven to be accurate, easy, and reliable; detection has posed constraints in preventing cyber crime.
  • 5. The cyber security landscape • Following are the cyber security landscape • Threats • Network security • System security
  • 6. Threats • Cyber threats to mobile devices can be divided into two main classes. • Communications-based threats include access network impersonation, mobile device impersonation, and man-in-the- middle attacks (both active and passive).
  • 7. Threats • System-based threats include software vulnerabilities, side channel attacks, and social engineering attacks (including malicious applications). Figure social engineering attacks
  • 8. Threats • Within a system we can employ a range of techniques, including: secure software design (to reduce the need to patch vulnerabilities), attack surface reduction (to reduce the impact of vulnerabilities), secure hardware/firmware design (to make finding side channel attacks difficult), careful user interface design (to reduce the risk of user error), and user education regarding threats.
  • 9. Network security Some currently deployed network access protocols offer very limited security. For example, authentication of the ‘access network’ to the device is sometimes non-existent, e.g. as in GSM and IEEE 802.11 Wi-Fi. This situation has given rise to a series of public domain implementations of ‘fake network’ attacks on GSM and IEEE 802.11, as well as attacks arising from compromised access points, where the compromise might arise from software or hardware attack. Pair-wise device authentication can also be vulnerable; for example the original Bluetooth pairing scheme was rather weak. In general, as a result of the lack of comprehensive and integrated security solutions for mobile connected devices, there is an ever-growing risk of widespread malware attacks, as devices become more ‘smart’ and flexible.
  • 10. System security System security problems with mobile devices have been known for some time. For example, the Register reported back in February 2007 that, according to McAfee, 3G malware attacks in mobile networks had reached a new high. Informa had reported that 83% of mobile operators were hit by mobile device infections in 2006, and the number of reported security incidents in 2006 was more than five times as high as in 2005. Even five years ago, 200 strains of mobile malware had been discovered. Since then the situation has got much worse, as more recent reports show. For example:
  • 11. System security Bloomberg reported8 in April 2011 that, according to Kaspersky, the ‘Android mobile-phone platform faces soaring software attacks and has little control over ... applications. [Kaspersky] identified 70 different types of malware in March, [an increase] from just two categories in September’. Wyatt, in ‘The Lookout Blog’, reported in May 2011 that ‘multiple applications available in the official Android Market were found to contain malware that can compromise a significant amount of personal data. Likely created by the same developers who brought DroidDream to market back in March, 26 applications were found to be infected with a stripped down version of DroidDream [called] ‘DroidDreamLight’. At this point we believe between 30,000 and 120,000 users have been affected by DroidDreamLight’. A Sophos report from November 2009-10 reports on a range of iPhone malware.
  • 12. Preventive Measures to Oppose Cyber Crime •Reduce Opportunities Reduce Opportunities to the Criminals Develop elaborate system design so that hacker does not hack the mobile. •Use Authentication Technology Use password bio-metric devices, finger print or voice recognition technology and retinal imaging, greatly immense the difficulty of obtaining unauthorized access to information systems. Attention to be paid to bio-metric technology as this recognizes the particular user’s authentication for using the particular devices. •Develop New Technology Develop Technology of encryption and anonymity and also for protecting infrastructure as hackers or cyber terrorists can attack over any nation’s infrastructure resulting in massive losses. .
  • 13. Preventive Measures to Oppose Cyber Crime •Understand Cyber Crime For volume, impact and legal challenges. Understand the benefit of proper equipment training and tools to control cyber crime. •Think about Nature of Crime Computer crime is diverse, a deep thought to be given, what cyber crime can take place in one’s particular organization, so that different types of monitoring/security system can be designed and proper documentation can be written for security system. •Adopt Computer Security Avail new sophisticated products and advice for computer crime prevention which is available free or paid in the market
  • 14. Preventive Measures to Oppose Cyber Crime •Use Blocking and Filtering Programs For detecting virus, since virus can identify and block malicious computer code. Anti Spyware software helps stopping the criminals from taking hold of one’s PC and helps to cleanup the PC if the same has been hit. •Monitoring Controls Separate monitoring to be done for (a) Monetary files (b) Business information. •Design Different Tools For different needs rather than using one particular tool. •Data Recovery Develop tools for data recovery and analysis •Reporting Always report the crime to cyber fraud complaint center in one’s country as they maintain huge data and have better tools for controlling cyber crime.
  • 15. Preventive Measures to Oppose Cyber Crime •Design Alert Systems Design the alert system when there is actual intrusion. •Install Firewalls (a) As they block particular network traffic according to security policy. (b) Patches are generally installed automatically and automatically fixes the software security flaws. •Install Original Software As they contain many security measures. Pirated software’s do not contain many security abilities which exist in the original software. •Online Assistance Develop regular online assistance to employees. Learn Internet to one’s advantage only and understand all tips to stay online safe.
  • 16. Preventive Measures to Oppose Cyber Crime •Avoid Infection Avoid infection rather than cleaning it afterwards keep browser up to date for security measures. •Avoid bogus Security Products As many anti-spyware activists’ runs a website that list bogus security products. Read the license agreement before installing any program. •Attachments Avoid opening attachments or e-mails which were not expecting and have come from unknown source or person. •Cross Check Cross check regularly the statements of financial accounts and internet banking.
  • 17. Conclusion The problems with cyber crime; how to improve efforts of prevention; and the response to cybercrime are what help us to look at the dangers of cyber space. The Internet is a very powerful tool and effective means of communication but it is vulnerable just like anything else. The way to protect it for now is for everyone to be smart and follow preventive measures; individuals, institutions, and government alike should all follow these measures. We have seen the actions of the government and what bots and viruses are capable of and it is important that security measures be implemented. In response to these issues there have been requests from the WGIG as well as congress to implement more standards and laws to help minimize cyber crime. In response to some problems there have been efforts by some nations by arresting individuals and The Lack of Attention in the Prevention of Cyber crime and How to Improve it 27 groups that commit cyber crimes like the ones discussed earlier. If everyone does their part, not only will they be safer but it will be setting an example for others as well as making it more difficult for hackers to cause damage.
  • 18. References [1] E. Barkan, E. Biham, and N. Keller, ‘Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication’. Journal of Cryptology 21(3) (2008) 392- 429. [2] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, ‘Comprehensive Experimental Analyses of Automotive Attack Surfaces’. In: D. Wagner (ed.), Proceedings of USENIX Security 2011, USENIX (2011). [3] B. Driessen, ‘Eavesdropping on satellite telecommunication systems’. Draft of February 8th 2012. [4] S. R. Fluhrer, I. Mantin, and A. Shamir, ‘Weaknesses in the Key Scheduling Algorithm of RC4’. In: Proc. Selected Areas in Cryptography 2001, Springer (2001) pp.1-24. [5] Acohido, B. (2007, June 14). Cyber crime arrests by FBI 'A tiny drop in the bucket'. (Final Edition).
  • 19. References [6] Cyber Security Industry Alliance. (2005). National Agenda for Information Security 2006. Virginia: Cyber Security Alliance. [7] Emke, J. (2008). Trends and Shocks, and the Impact of the Acquisition Community. Defense AT&L , 37 (1), 3. [8] Furnell, S. (2002). Cyber crime: Vandalizing the Information Society. Boston, MA, USA: Addison Wesley. Gibson, S. (2006). Stepping up the Effort to Beat Cyber-Crime. Eweek.com.