This document discusses cyber crime and provides information on various types of cyber crimes such as financial crimes, email spoofing, and distributed denial of service attacks. It also discusses vulnerabilities of computers that make them susceptible to cyber crimes. Specific cyber crimes discussed in India include hacking, cyber terrorism, and online gambling. The WannaCry ransomware attack of 2017 is described as an example of a major cyber crime. Various tips are provided on protecting yourself from cyber crimes such as using strong passphrases, firewalls, antivirus software, and being wary of emails and online file sharing.
2. What is cyber crime?
Types of cyber crime
Cyber crime in India statistics
Who are cyber criminals?
Types of hackers
Why computers vulnerable?
WannaCry Ransomware
Ways to protect yourself from cyber crime
Conclusion
References
3. WHAT IS CYBER CRIME?
Cyber crime, or computer oriented crime, is a crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it
may be the target. Cyber crime can be defined as: "Offences that are committed
against individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm, or loss, to the
victim directly or indirectly, using modern telecommunication networks such as
Internet (networks including but not limited to Chat rooms, emails, notice boards
and groups) and mobile phones (Bluetooth/SMS/MMS)".
5. FINANCIAL CRIME
– This would include cheating, credit card frauds, money laundering etc. To cite a
recent case, a website offered to sell Alphonso mangoes at a throwaway price.
Distrusting such a transaction, very few people responded to or supplied the
website with their credit card numbers. These people were actually sent the
Alphonso mangoes. The word about this website now spread like wildfire.
Thousands of people from all over the country responded and ordered mangoes
by providing their credit card numbers. The owners of what was later proven to
be a bogus website then fled taking the numerous credit card numbers and
proceeded to spend huge amounts of money much to the chagrin of the card
owners.
10. DISTRIBUTE
D DENIAL
OF SERVICE
ATTACK
A DDoS attack focuses on
disrupting the service to a
network. Attackers send
high volumes of data or
traffic through the network
(i.e. making lots of
connection requests), until
the network becomes
overloaded and can no
longer function
19. –WHY COMPUTER VULNERABLE
– Computers, despite being such high technology devices, are extremely
vulnerable. In fact it may be easier to steal national secrets from military
computers than to steal "laddoos" from a "mithai" shop. Let us examine
the reasons for the vulnerability of computers.
– Computers store huge amounts of data in small
– Ease of access
– Complexity
– Human error
20.
21.
22.
23.
24. The WannaCry ransomware attack was a May 2017 worldwide
cyberattack by the WannaCry ransomware cryptoworm, which targeted
computers running the Microsoft Windows operating system by
encrypting data and demanding ransom payments in the Bitcoin crypto
currency.
The attack began on Friday, 12 May 2017, with evidence pointing to an
initial infection in Asia at 7:44am UTC. The initial infection was likely
through an exposed vulnerable SMB port, rather than email phishing as
initially assumed. Within a day the code was reported to have infected
more than 230,000 computers in over 150 countries.
Linguistic analysis of the ransom notes indicated the authors were likely
fluent in Chinese and proficient in English, as the versions of the notes
in those languages probably human-written while the rest seemed to be
machine-translated.
Organizations that had not installed Microsoft's security update
from April 2017 were affected by the Experts quickly advised affected
users against paying the ransom due to no reports of people getting their
data back after payment and as high revenues would encourage more
25.
26. Instead of ‘Passwords’, Use ‘Passphrases’
for
Different websites.
Secure your computer/laptop physically and
by:
i.Activating your firewall.
ii.Using Anti-Virus/Anti-Malware
software.
Never upload your personal data
‘unencrypted’ to drop box, google drive or
any online file sharing services. (Use
Bitlocker)
Restrict download.
Do not procrastinate update installations
(even the
“installing 127 of 1204” ones) !
Wi-Fi-The most vulnerable network Ever!!
Encrypt your data (Important) .
Reduce transfer of data .
Protect your e-identity, look for https://
Do NOT store your card details on websites
.
Got hacked??Call the right person/ lawyer /
LEA (Law Enforcement Agency) for help.
Never Trust E-mails.
Do not share a code received accidentally
via 2 step
verification!
Review your credit card statements.
Crosscheck your Social-Media security
settings
27.
28.
29. Cyber Crimes Against Persons
Harassment via E-Mails (Email harassment is the act of consistently sending
unwanted electronic communications to a person to intimidate, frighten, or...)
Hacking
E-Mail / SMS Spoofing (E-mail spoofing is the forgery of an e-mail header so
that the message appears to have originated from someone or
somewhere other than the actual source.)
Carding( False credit card/debit card etc.)
Assault by Threat (threatening)
30. Cyber Crimes Against Property
Intellectual Property Crimes (Criminal offences (counterfeiting and piracy)
Infringement of trade marks and copyrights can be criminal offences)
Cyber Squatting (is registering, trafficking in, or using a domain name with bad faith
intent to profit from the goodwill of a trademark belonging to someone else.)
Cyber Vandalism (Cyber vandals are individuals who damage information infrastructures
purely for their own enjoyment and pleasure. Their primary motivation is not financial;)
Transmitting Virus
Internet Time Thefts - Internet time theft comes under the heading of hacking. It is the
use by an unauthorized person of the Internet hours paid for by another person.
31. Cyber Crimes Against Government
Cyber Terrorism:
Cyber Terrorism is a phrase used to describe the use of Internet based attacks in terrorist
activities, including acts of deliberate, large-scale disruption of computer networks,
especially of personal computers attached to the Internet, by the means of tools such as
computer viruses.
32. Cyber crimes Against Society
Cyber Trafficking Drug traffickers are increasingly taking advantage of the Internet"
according to cyber authorities and personnel. to sell their illegal substances through
encrypted
Online Gambling (gambling using the Internet.)
Forgery - person is guilty of forgery if he or she makes a false instrument with the
intention that it shall be used to induce another person t
by reason of so accepting it, to do some act, or to m prejudice of that person or any
other person.
33.
34. I would like to express my deepest appreciation to all
those who have been a support to me in completing
this project. A special gratitude I would want to give
to PROF. DR. RIZWAN KHAN for his outstanding
guidance, suggestions and all the assist in carrying
this out, nevertheless for which this project would
not have been accomplished.