Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

Security Researcher at Adobe, Chapter Leader at OWASP & null
Aug. 3, 2014
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
1 of 23

More Related Content

Slideshows for you

Get Rid Of Windows Safety Checkpoint - Guideline to Automatic  RemovalGet Rid Of Windows Safety Checkpoint - Guideline to Automatic  Removal
Get Rid Of Windows Safety Checkpoint - Guideline to Automatic Removalcostamary
Uninstall searchpassage.com – searchpassage.com removal guideUninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guidecoseanonans
Huawei Wa1003aHuawei Wa1003a
Huawei Wa1003avarghese2lijo
Secure wireless modemSecure wireless modem
Secure wireless modemmangal das
Remove chromium from computerRemove chromium from computer
Remove chromium from computerharoNaroum
Steps to disable strong signal adsSteps to disable strong signal ads
Steps to disable strong signal adshuasom

Viewers also liked

(2014 관측회) 점상촬영법(2014 관측회) 점상촬영법
(2014 관측회) 점상촬영법soar7sci
νεο λυκειονεο λυκειο
νεο λυκειοelpitheo
Public-Private Roundtables at the Fourth Clean Energy MinisterialPublic-Private Roundtables at the Fourth Clean Energy Ministerial
Public-Private Roundtables at the Fourth Clean Energy MinisterialValerie Riedel
The change.asia  - results not reportsThe change.asia  - results not reports
The change.asia - results not reportspck100
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamOWASP Delhi
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims Meisam J Moghadam

Similar to Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
Cyber SecurityCyber Security
Cyber SecurityAdeel Younas

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
UDP HunterUDP Hunter
UDP HunterOWASP Delhi
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi

Recently uploaded

Automation Suite PPT (2).pptxAutomation Suite PPT (2).pptx
Automation Suite PPT (2).pptxRohitRadhakrishnan8
毕业证靠谱[办理莱斯利大学毕业证文凭学历认证]毕业证靠谱[办理莱斯利大学毕业证文凭学历认证]
毕业证靠谱[办理莱斯利大学毕业证文凭学历认证]yovuyhp
internet architecture.pdfinternet architecture.pdf
internet architecture.pdfqhawengcongo
如何办理温切斯特大学毕业证成绩单改成绩如何办理温切斯特大学毕业证成绩单改成绩
如何办理温切斯特大学毕业证成绩单改成绩uywmmd
办美国大学毕业证学位证圣约翰大学毕业证制作|办美国大学毕业证学位证圣约翰大学毕业证制作|
办美国大学毕业证学位证圣约翰大学毕业证制作|vweuwx
《留学辍学》《精仿查尔斯特大学毕业证学位证书》《留学辍学》《精仿查尔斯特大学毕业证学位证书》
《留学辍学》《精仿查尔斯特大学毕业证学位证书》gcafbox

Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

  1. Presentation by : Priyanka Tomar priyanka@newerasystem.com
  2. Objective  Provide a brief idea of cyber/computer attacks and preventive measure to be adopted with reference to Law Enforcement Agencies.
  3. PREREQUISITES  Computer Hardware  Computer Software  Internet Surfing  Email  Networking  IP Address
  4. Combating Cyber Crime  Cyber + Security  What is Security  What is Cyber Security  involves detection, prevention and responding to attacks  Why do we need Cyber Security –Phishing, Credit Card Frauds
  5. Combating Cyber Crime  Who is Vulnerable –e.g. screen hack
  6. Cyber Security Threats  Virus  Worm  Trojan Horse  Remote Administration Tool – Prorat, Poison Ivy
  7. Cyber Security Threats-RAT The operator controls the RAT through a network connection. RAT provide an operator the following capabilities:  Screen/camera control.  File management (download/upload/execute etc.  Shell control (from command prompt).  Computer control (power off/on/log off).  Registry management (query/add/delete/modify).  Start, stop and restart Windows services.  Copy/delete files and format disks.  View and clear the windows event logs.  Other software product-specific functions.
  8. Cyber Security Threats  Hackers  Identity Thieves  Spyware/Adware  Website advertisements
  9. Consequences of Inaction  Loss of access  Loss of confidentiality, integrity and public trust  Lawsuits, Disciplinary action The US has charged six members of an international cybercrime gang that hacked into user accounts to defraud eBay's Stubhub ticket reselling website of about $1m. The men were arrested in the UK, Canada and Spain in connection with the scam in which more than 1,600 StubHub users had their credit cards used to buy tickets, which were then sold on by the criminals.
  10. Preventive Measures -I  OS/Software Updates  Anti virus  Personal Firewalls  Check Open Ports -http://www.auditmypc.com/firewall-test.asp
  11. How to block Ports  Block Ports  Control Panel>System and Security> Windows Firewall  Advanced Settings  See inbound and outbound rules  Create your own rule
  12. How to know if there is spyware?  Endless pop-up windows.  Redirected to other websites automatically.  Random Windows error messages .  Computer suddenly seems slow.  New and unexpected toolbars appear in web browser.  New and unexpected icons appear in the task tray.  Browser's home page suddenly changed.  Search engine your browser opens has been changed.
  13.  Don't click on links within pop-up windows  Be careful while installing free software , never forget to read user agreement.  Block pop-up windows and cookies by adjusting browser preferences.  Be aware of unexpected dialog boxes asking -Do you want to run a xxxx program . Always select "no" or "cancel," or close the dialog box. Prevent Spyware Installation
  14. Remove Spyware  Spyware copies several files to different directories and changes the registry. Use a spyware remover - a program dedicated to removal of sypware.  Run a legitimate product to remove spyware e.g Ad-Aware, Microsoft Window Defender, Webroot's SpySweeper etc.
  15. Preventive Measures-II  Prevent Identity Theft-Beware of phishing scams - a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal/ financial account information. These often do not include a personal salutation. Never enter personal information into an online form you accessed via a link in an email you were not expecting. Legitimate businesses will not ask for personal information online.  Intrusion Detection Software/Device
  16. Phishing Google Security Team to Sunitha Verification Required. Dear Gmail User, The Gmail infrastructure is going through an annual security and performance overhaul. In the same respect, you are requested to verify your account by clicking on the following link. The Google Security Team is available to provide you all the assistance for secure communication over the Internet. Happy surfing! accountverification.gmail.com/src/verify.php?confirmation=dhPGcsiuUNdnAoN77q5CHwCgl4MmCAXE 72d You are requested to act on this immediately to guarantee the smooth functioning of your mail account. Thanks, Account Security Administrator Google Security Team Google, Inc. Phone: +1 650-253-0000 You are receiving this message from Google because you are a valued member. Google respects your privacy. To learn more, please read our online Privacy Statement. For more information or for general questions regarding your e-mail account, please visit Gmail Help. Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043. All rights reserved.
  17. Preventive Measures  Protect Passwords  Regular Backup
  18. Preventive Measures -II  Setup Cyber Security Policies  Email Virus Filtering Services  Firewall Services  Email attachment Filtering  Vulnerability Scanning  Intrusion Prevention System
  19. By: Priyanka Tomar priyanka@newerasystem.com