SlideShare a Scribd company logo
1 of 24
History And Future Cybercrime
Introduction
• Cybercrimes can be basically divided into 3 major categories:
1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against government.
• "Any criminal activity that uses a computer
either as an instrumentality, target or a means
for perpetuating further crimes comes within
the ambit of cyber crime."
what makes a crime a cyber crime??
• when information and communications technology (ICT)
systems and intellectual property become targets of
exploitation, intrusion, identity and information theft.
• when ICT devices are used as means to commit crimes
• where the ICT devices are used as mediums of committing
crimes. For example, sedition, disharmony or unrest,
slandering and instigating at higher scale come under this
category
Two Threat Categories:
1. Emerging Threats to National Security
Computer Intrusions from:
• Terrorist Groups
• State Actors
2. Traditional Crime Migrating to the Internet
Cyber-facilitated:
• Hacking Groups
• On-line Child Exploitation
• Intellectual Property Violations
• Internet Fraud
• Identity Theft
The Cyber Threat EnvironmentThe Cyber Threat Environment
National Security
• Terrorist Groups
• Web-sites
• Forums
• Bulletin Boards
Common Internet Crime Schemes
• Credit/Debit Card Fraud
• Identity Theft
• Phishing
• Mortgage Fraud
• Investment Fraud
• Computer Intrusions
• Online Auction Fraud
• Non-Delivery of Merchandise
• Business Employment Schemes
• Freight Forwarding/Reshipping
• Fake Escrow Services
• Ponzi & Pyramid Schemes
Current Environment
Carding Among Hackers
• Illicit Trafficking in Stolen Credit Card Information
• Conducted Openly on Russian-language Hacker Sites Starting
in the Late 1990s
• Confluence of Events in Late 1990s
– Appearance of Domestic Credit Cards in RF
– Dot-Com E-commerce Boom
– Economic Collapse of 1998 —> Widespread Unemployment in the
Nascent IT Sector
A Brief History…
……and the Future..?and the Future..?
The Present Reality...
Early Hacker Postings “Buying / Selling”
D0D0: “ I am selling credit cards in
batches of 100 pieces ”
Khyr: “I am buying
credit cards ”
Carder Sites
Carding Internet Sources
WEB SITES, SUCH AS
• www.web-hack.ru
• Cardingworld.cc
ARE AVAILABLE TO ALL WHO WISH A
NEW IDENTITY.
- Look like legitimate ID/Driver’s License but may
contain the word “Novelty” somewhere in small print
How They Get Your Info
• Spam
• Pre-texting/Social Engineering/Fake Sites
• Compromised Databases
• Skimming
• Old Computers
Motivation
• Show me the money$$$
– Generation of hackers have grown up.
– Needs have shifted to accommodate age.
– Need to pay for:
• Food
• Rent
• Love life
CYBERSLAM
ROBY
ASHLEY
ECHOUAFNI
WALKER
HALLSCHICHTEL
Trends and Predictions
• Spear Phishing
– Faked “internal” emails
• Continued attacks on personal information
– Outsourcing to third party businesses
– Blogs “Myspace.com”
• Continued increase in cross border attacks
– Exploiting poor law enforcement cooperation between
many countries.
Trends and Predictions
• WiFi
– Easy behind the firewall access to networks
• VoIP
– DoS against phones or call hijacking
– Covert Trojan delivery (researched by some Universities
around the world)
– SPIT - Voice spam
• BIOS (hardware) level rootkits
– Can be written in common programming language for
cross platform use
Trends and Predictions
• Attacks continue to get more sophisticated
– Difficult to detect
– Faster propagation (ie Botnets)
• End users more at risk
– Shift from servers to clients
• Response tools very basic
– Tools still very basic
Trends and Predictions
• Instant message bots
– Artificial intelligence software that convinces you
to download virus.
• Application targeted attacks
– Programs that require Internet access to work
(Oracle, RealPlayer, iTunes…)
• More relevant IDS and network protection
– False positive rate currently too high.
Case Study …
Security Risk For Home User…
• Confidentiality
• Integrity
• Availability
Example of Intellectual property theft:-
Data crimes
• Data Interception: Interception of data in
transmission.
• Data Modification: Alteration, destruction, or erasing
of data.
• Data Theft: Taking or copying data, regardless of
whether it is protected by

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trendsHadeel Sadiq Obaid
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Phising
PhisingPhising
Phising
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio CerberusCerberus Pt
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Mikhail Kurnosov
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba ServerMayur Verma
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012vsharma78
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모Soo Jeong Cheong
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware ReportPratik Vyas
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010leewclark
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentS. M. Hossein Hamidi
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio Cerberus
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
Jaba sat explorer-710
Jaba sat explorer-710Jaba sat explorer-710
Jaba sat explorer-710
 
Sp ws1 ulrich teichler
Sp ws1 ulrich teichlerSp ws1 ulrich teichler
Sp ws1 ulrich teichler
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
 
cIHMS
cIHMScIHMS
cIHMS
 
Finding Time to Study for the CIH Exam
Finding Time to Study for the CIH ExamFinding Time to Study for the CIH Exam
Finding Time to Study for the CIH Exam
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
 

Similar to History and future cybercrime

Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxAshwini831102
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeakingAdarsh
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRAKrishnakant Mishra
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 

Similar to History and future cybercrime (20)

Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Hacking
Hacking Hacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
cyber crime
cyber crimecyber crime
cyber crime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Hacking
HackingHacking
Hacking
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

More from Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

More from Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Recently uploaded

Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 

Recently uploaded (20)

Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 

History and future cybercrime

  • 1. History And Future Cybercrime
  • 2. Introduction • Cybercrimes can be basically divided into 3 major categories: 1. Cybercrimes against persons. 2. Cybercrimes against property. 3. Cybercrimes against government.
  • 3. • "Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime."
  • 4. what makes a crime a cyber crime?? • when information and communications technology (ICT) systems and intellectual property become targets of exploitation, intrusion, identity and information theft. • when ICT devices are used as means to commit crimes • where the ICT devices are used as mediums of committing crimes. For example, sedition, disharmony or unrest, slandering and instigating at higher scale come under this category
  • 5. Two Threat Categories: 1. Emerging Threats to National Security Computer Intrusions from: • Terrorist Groups • State Actors 2. Traditional Crime Migrating to the Internet Cyber-facilitated: • Hacking Groups • On-line Child Exploitation • Intellectual Property Violations • Internet Fraud • Identity Theft The Cyber Threat EnvironmentThe Cyber Threat Environment
  • 6. National Security • Terrorist Groups • Web-sites • Forums • Bulletin Boards
  • 7.
  • 8. Common Internet Crime Schemes • Credit/Debit Card Fraud • Identity Theft • Phishing • Mortgage Fraud • Investment Fraud • Computer Intrusions • Online Auction Fraud • Non-Delivery of Merchandise • Business Employment Schemes • Freight Forwarding/Reshipping • Fake Escrow Services • Ponzi & Pyramid Schemes
  • 9. Current Environment Carding Among Hackers • Illicit Trafficking in Stolen Credit Card Information • Conducted Openly on Russian-language Hacker Sites Starting in the Late 1990s • Confluence of Events in Late 1990s – Appearance of Domestic Credit Cards in RF – Dot-Com E-commerce Boom – Economic Collapse of 1998 —> Widespread Unemployment in the Nascent IT Sector A Brief History…
  • 10. ……and the Future..?and the Future..? The Present Reality...
  • 11. Early Hacker Postings “Buying / Selling” D0D0: “ I am selling credit cards in batches of 100 pieces ” Khyr: “I am buying credit cards ”
  • 13.
  • 14. Carding Internet Sources WEB SITES, SUCH AS • www.web-hack.ru • Cardingworld.cc ARE AVAILABLE TO ALL WHO WISH A NEW IDENTITY. - Look like legitimate ID/Driver’s License but may contain the word “Novelty” somewhere in small print
  • 15. How They Get Your Info • Spam • Pre-texting/Social Engineering/Fake Sites • Compromised Databases • Skimming • Old Computers
  • 16. Motivation • Show me the money$$$ – Generation of hackers have grown up. – Needs have shifted to accommodate age. – Need to pay for: • Food • Rent • Love life
  • 18. Trends and Predictions • Spear Phishing – Faked “internal” emails • Continued attacks on personal information – Outsourcing to third party businesses – Blogs “Myspace.com” • Continued increase in cross border attacks – Exploiting poor law enforcement cooperation between many countries.
  • 19. Trends and Predictions • WiFi – Easy behind the firewall access to networks • VoIP – DoS against phones or call hijacking – Covert Trojan delivery (researched by some Universities around the world) – SPIT - Voice spam • BIOS (hardware) level rootkits – Can be written in common programming language for cross platform use
  • 20. Trends and Predictions • Attacks continue to get more sophisticated – Difficult to detect – Faster propagation (ie Botnets) • End users more at risk – Shift from servers to clients • Response tools very basic – Tools still very basic
  • 21. Trends and Predictions • Instant message bots – Artificial intelligence software that convinces you to download virus. • Application targeted attacks – Programs that require Internet access to work (Oracle, RealPlayer, iTunes…) • More relevant IDS and network protection – False positive rate currently too high.
  • 23. Security Risk For Home User… • Confidentiality • Integrity • Availability
  • 24. Example of Intellectual property theft:- Data crimes • Data Interception: Interception of data in transmission. • Data Modification: Alteration, destruction, or erasing of data. • Data Theft: Taking or copying data, regardless of whether it is protected by

Editor's Notes

  1. “I am selling credit cards in batches of 100 pieces” “I am buying credit cards”