SlideShare a Scribd company logo
1 of 25
CONTENTS
• About cybercrime
• Definition of cybercrime
• Types
• Hacking and its tools
• Denial of service attack and its tools
• Phishing and its example
• SIPRNET
• Virus dissemination
• Cain and abel
• Cyberlaw
• Cyber security
What is Cybercrime?
[1]Computer crime, or
cybercrime, refers to any crime
that involves a computer and a
network, where the computers
may or may not have played an
instrumental part in the
commission of a crime. Net
crime refers, more precisely, to
criminal exploitation of the
Internet.
Computer Crimes are
Vulnerable
Because off :-
1)Anonymity,
2)Weakness in Operating
System,
3)Lack off Awareness off
user.
Types of Cyber Crime
(This is not exhaustive list of cybercrime)
 HACKING
 DENIAL OF SERVICE
ATTACK
 VIRUS DISSEMINATION
 SOFTWARE PIRACY
 PORNOGRAPHY
 IRC Crime
 CREDIT CARD FRAUD
PHISHING
CYBER STALKING
THREATENING
SALAMI ATTACK
Hacking…..or Cracking??
A hacker is a person who is
proficient with computers and/or
programming to an expert
level where they know all of the
in's and out's of a system. There
is NO illegality involved with
being a hacker. A cracker is a
hacker who uses his proficiency
for personal gains outside of the
law. EX: stealing data, changing
bank accounts. It's then safe to
say that all crackers are hackers,
but not all hackers are crackers.
Hacking tools…
 Nmap - scans and detects ports.
 Wireshark - it is a sniffer that lets you
capture and interactively browse the
contents of network frames.
 LCP – Windows Password Cracker
 SuperScan - It is great TCP/IP port scanner
which is widely used for detecting the open
ports or live hosts in given IP ranges
 Keyloggers – tracks the keys struck on
keyboard and monitors them.
Denial-of-service attack
 A denial-of-service attack (DoS attack) is an attempt to make a
computer resource unavailable to its intended users.
 DoS attacks are commonly launched from one or more points on
the Internet that are external to the victim’s own system or
network.
 The types of DoS attacks are Ping of Death and SYN attacks. A
Ping of Death attack involves a very large Internet Control
Messaging Protocol (ICMP) packet and the receiving computer
gets it in the form of data packets. Then it tries to reassemble it.
When reassembled the packet proves to be too large for the
buffers and overflows it. The consequences may be anything from
reboots to system hangs.
 The SYN attack involves the three-way handshake of the TCP/IP
protocol. First the client sends a SYN packet to the server. Then
the server responds with a SYN-ACK. When the client responds
to this, only then does the client-server conversation really start.
Now in a SYN attack the client does not respond to the SYN-
ACK. It waits till just before the service time expires and then
sends another request. This way the server machine remains
engaged.
Tools regarding DOS
Trinity is a Linux-based distributed
denial-of-service attack tool that a
hacker can use to launch a massive
IP flood against a victim's targeted
computer. It must first be secretly
installed on a hacked Linux server;
after that, the agent can be remotely
controlled to launch a network
flood. It prevents the hacker from
being identified The major versions
of distributed denial of service
attack tools are Trinoo (or trin00),
TFN, TFN2K and Stacheldraht.
Phishing…
The act of sending email that
falsely claims to be from a
legitimate organization. This
is usually combined with a
threat or request for
information: for example,
that an account will close, a
balance is due, or
information is missing from
an account. ...
[2]How it is done??
 Fake websites-A domain name similar to a legitimate site is
bought, and molded to look exactly like the real thing. The
phisher then sends out messages, either by e-mail, instant
messaging, Facebook messages, text messages, and so forth
to fool a victim into clicking a link to the fake site. The
unsuspecting victim logs in and their credentials logged.
 Fake Pop-up -A link was still sent, however, instead of
linking to a fake website, it would link to the actual
website. When the real website loads, a pop-up appears
asking for the user's credentials. The victim, seeing the
legitimate site in the background would think the pop-up
was from a legitimate source and enter their information.
In reality, the pop-up would be the hacker's tool to phish
credentials.
-
[3]Security Threats.. How wikileaks break
security of USA network SIPRNET
 Siprnet is a communication network
which is being used by the Ministry
of defense USA. It is also called internet
protocol secret network. This network was
shared among foreign officials of USA to
exchange sensitive information. Siprnet is
considered as source of wikileaks
documents which they are broadcasting.
 The most astonishing feature is that there
is no current proof…how it occurred…
 It was thought that one of its members
Bradely Manning leaked the contents but
wikileaks denied that.
 There was no log of evidence that the
system was used out of network terminals
which were allotted.
VIRUS DISSEMINATION
A computer virus is a program that
can ‘infect’ other legitimate
programs by modifying them to
include a possibly ‘evolved’ copy
of itself. Viruses can spread
themselves, without the
knowledge or permission of the
users, to potentially large
numbers of programs on many
machines. A computer virus
passes from computer to
computer like a biological virus
passes from person to person.
Virus distributed via internet
Virus distributed via common diskettes
Online Ads – New Virus Spreading
Tools for Hackers
 Web ads, unintentionally, have become a
powerful tool in the hands of hackers for
spreading viruses.
 Recently, a computer virus in the
advertisement on tomshadware.com has
been discovered which automatically takes
the users to a website which installs
malware.
Spreading Virus – Local Networks
Now let me give you an example of a software
which is easily available…and it sniffs the
packets of the ip addresses connected to the
system on which it is being running…
The name of the software is Cain & Abel and it is a
password recovery tool for Microsoft Operating
Systems. It allows easy recovery of several kind of
passwords by sniffing the network, cracking
encrypted passwords using Dictionary, Brute-
Force and Cryptanalysis attacks, recording VoIP
conversations, decoding scrambled passwords,
recovering wireless network keys, revealing
password boxes, uncovering cached passwords
and analyzing routing protocols
CYBERLAW..
Cyberlaw is a constantly evolving
process. As the Internet grows,
numerous legal issues arise. These
issues vary from Domain Names, to
Intellectual Property Rights,
Electronic Commerce, Privacy,
Encryption to Spamming and so on
.Internet in India came in 1995 and
after almost 5 years, India gets ready
to legislate its first Cyberlaw namely
the Information Technology Bill 1999.
The said bill is presently pending in
Parliament.
by :- Mr.Pawan Duggal
Advocate, Supreme Court of India &
Cyberlaw Expert
Cyber Safety..
It is a common term used to describe a
set of practices, measures and or
actions you can take to protect your
personal information and your
computer.
Top seven cyber safety actions
1.Install OS/Software updates
2.Run antivirus software
3.Prevent Identity theft
4.Turn on personal firewalls
5.Avoid spyware/adware
6.Protect passwords
7.Back up important files
References
1) http://en.wikipedia.org/wiki/Main_Page
2) http://www.brighthub.com/internet/security-
privacy/articles/67339.aspx
3) http://securiour.com/2010/12/01/how-wikileaks-
break-security-of-usa-network-siprnet/
Books referred:-
Kevin J. Houle, CERT/CC,George M. Weaver, CERT/CC:
Trends in Denial of Service Attack Technology

More Related Content

Similar to presentation_cybercrime_1486105587_257582.ppt

Similar to presentation_cybercrime_1486105587_257582.ppt (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
hacking
hackinghacking
hacking
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 

Recently uploaded

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

presentation_cybercrime_1486105587_257582.ppt

  • 1. CONTENTS • About cybercrime • Definition of cybercrime • Types • Hacking and its tools • Denial of service attack and its tools • Phishing and its example • SIPRNET • Virus dissemination • Cain and abel • Cyberlaw • Cyber security
  • 2. What is Cybercrime? [1]Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Net crime refers, more precisely, to criminal exploitation of the Internet.
  • 3. Computer Crimes are Vulnerable Because off :- 1)Anonymity, 2)Weakness in Operating System, 3)Lack off Awareness off user.
  • 4. Types of Cyber Crime (This is not exhaustive list of cybercrime)  HACKING  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINATION  SOFTWARE PIRACY  PORNOGRAPHY  IRC Crime  CREDIT CARD FRAUD PHISHING CYBER STALKING THREATENING SALAMI ATTACK
  • 5. Hacking…..or Cracking?? A hacker is a person who is proficient with computers and/or programming to an expert level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker. A cracker is a hacker who uses his proficiency for personal gains outside of the law. EX: stealing data, changing bank accounts. It's then safe to say that all crackers are hackers, but not all hackers are crackers.
  • 6. Hacking tools…  Nmap - scans and detects ports.  Wireshark - it is a sniffer that lets you capture and interactively browse the contents of network frames.  LCP – Windows Password Cracker  SuperScan - It is great TCP/IP port scanner which is widely used for detecting the open ports or live hosts in given IP ranges  Keyloggers – tracks the keys struck on keyboard and monitors them.
  • 7. Denial-of-service attack  A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users.  DoS attacks are commonly launched from one or more points on the Internet that are external to the victim’s own system or network.  The types of DoS attacks are Ping of Death and SYN attacks. A Ping of Death attack involves a very large Internet Control Messaging Protocol (ICMP) packet and the receiving computer gets it in the form of data packets. Then it tries to reassemble it. When reassembled the packet proves to be too large for the buffers and overflows it. The consequences may be anything from reboots to system hangs.  The SYN attack involves the three-way handshake of the TCP/IP protocol. First the client sends a SYN packet to the server. Then the server responds with a SYN-ACK. When the client responds to this, only then does the client-server conversation really start. Now in a SYN attack the client does not respond to the SYN- ACK. It waits till just before the service time expires and then sends another request. This way the server machine remains engaged.
  • 8. Tools regarding DOS Trinity is a Linux-based distributed denial-of-service attack tool that a hacker can use to launch a massive IP flood against a victim's targeted computer. It must first be secretly installed on a hacked Linux server; after that, the agent can be remotely controlled to launch a network flood. It prevents the hacker from being identified The major versions of distributed denial of service attack tools are Trinoo (or trin00), TFN, TFN2K and Stacheldraht.
  • 9. Phishing… The act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information: for example, that an account will close, a balance is due, or information is missing from an account. ...
  • 10.
  • 11. [2]How it is done??  Fake websites-A domain name similar to a legitimate site is bought, and molded to look exactly like the real thing. The phisher then sends out messages, either by e-mail, instant messaging, Facebook messages, text messages, and so forth to fool a victim into clicking a link to the fake site. The unsuspecting victim logs in and their credentials logged.  Fake Pop-up -A link was still sent, however, instead of linking to a fake website, it would link to the actual website. When the real website loads, a pop-up appears asking for the user's credentials. The victim, seeing the legitimate site in the background would think the pop-up was from a legitimate source and enter their information. In reality, the pop-up would be the hacker's tool to phish credentials. -
  • 12. [3]Security Threats.. How wikileaks break security of USA network SIPRNET  Siprnet is a communication network which is being used by the Ministry of defense USA. It is also called internet protocol secret network. This network was shared among foreign officials of USA to exchange sensitive information. Siprnet is considered as source of wikileaks documents which they are broadcasting.  The most astonishing feature is that there is no current proof…how it occurred…  It was thought that one of its members Bradely Manning leaked the contents but wikileaks denied that.  There was no log of evidence that the system was used out of network terminals which were allotted.
  • 13. VIRUS DISSEMINATION A computer virus is a program that can ‘infect’ other legitimate programs by modifying them to include a possibly ‘evolved’ copy of itself. Viruses can spread themselves, without the knowledge or permission of the users, to potentially large numbers of programs on many machines. A computer virus passes from computer to computer like a biological virus passes from person to person.
  • 15. Virus distributed via common diskettes
  • 16. Online Ads – New Virus Spreading Tools for Hackers  Web ads, unintentionally, have become a powerful tool in the hands of hackers for spreading viruses.  Recently, a computer virus in the advertisement on tomshadware.com has been discovered which automatically takes the users to a website which installs malware.
  • 17. Spreading Virus – Local Networks
  • 18. Now let me give you an example of a software which is easily available…and it sniffs the packets of the ip addresses connected to the system on which it is being running… The name of the software is Cain & Abel and it is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of several kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute- Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols
  • 19.
  • 20.
  • 21.
  • 22. CYBERLAW.. Cyberlaw is a constantly evolving process. As the Internet grows, numerous legal issues arise. These issues vary from Domain Names, to Intellectual Property Rights, Electronic Commerce, Privacy, Encryption to Spamming and so on .Internet in India came in 1995 and after almost 5 years, India gets ready to legislate its first Cyberlaw namely the Information Technology Bill 1999. The said bill is presently pending in Parliament. by :- Mr.Pawan Duggal Advocate, Supreme Court of India & Cyberlaw Expert
  • 23. Cyber Safety.. It is a common term used to describe a set of practices, measures and or actions you can take to protect your personal information and your computer.
  • 24. Top seven cyber safety actions 1.Install OS/Software updates 2.Run antivirus software 3.Prevent Identity theft 4.Turn on personal firewalls 5.Avoid spyware/adware 6.Protect passwords 7.Back up important files
  • 25. References 1) http://en.wikipedia.org/wiki/Main_Page 2) http://www.brighthub.com/internet/security- privacy/articles/67339.aspx 3) http://securiour.com/2010/12/01/how-wikileaks- break-security-of-usa-network-siprnet/ Books referred:- Kevin J. Houle, CERT/CC,George M. Weaver, CERT/CC: Trends in Denial of Service Attack Technology