SlideShare a Scribd company logo
1 of 61
Prof. Mukesh N Tekwani (mukeshtekwani@outlook.com)
For Whom ?
This presentation is based on the lectures delivered for
students of B. Voc. (Semester 2 ) Computing Skills (TISS) at
HMMRA, Vile Parle, Mumbai during January – February 2019
Contents of this presentation may also be useful to other
students pursuing similar courses.
--- Prof. Mukesh N Tekwani, Mumbai
mukeshtekwani@outlook.com
2
Cyber?
1. The term Cyberspace was first coined by William
Gibson in 1982, in his novel Neuromancer.
2. Cyber - relating to computers, information technology
and virtual reality
3
What is Cyber Crime?
1. Any illegal activity committed using a computer and / or
Internet
2. Cybercrime is - “unlawful acts wherein the computer is
either a tool or a target or both”.
3. Cyber crime is an extension of existing illegal activities
4
Causes of Cyber Crime
1. Internet makes it easy to do a cyber crime
2. ‘Crime at a distance’ - the perpetrator does not have to be
at the scene of the crime
3. The criminal can be faceless – till the crime is solved, if it is
solved!
4. Conviction rates are fairly low as technology makes the
detection process difficult
5. Low risk – high returns – low convictions => this has led to
increase in cyber crime
5
Basic Terminology - 1
1. Threat – An event or an action that has got the ability to
violate the security or to compromise the system
2. Exploit – a way to breach the security of a machine
through a loophole or a vulnerability
3. Vulnerability – A weakness in the design or existence of a
loop hole that could lead to undesirable or unexpected
events that could compromise the security
6
Basic Terminology - 2
4. Attacker – Any individual who compromises the security of
a machine in order to steal, manipulate or cause
destruction of data
5. Attack – The action that is performed by an attacker that
would harm the system or the information stored in it
6. Data Theft – Action of stealing data/information from the
victim’s machine
7
Types of Cyber Crimes
1. Crimes against Persons – stalking, nuisance, harassment,
defamation
2. Crimes against property – data, information, computer,
communication device, damage to source code
3. Crimes against government – cyber terrorism, cyber war
4. Social media crimes
8
Types of Cyber Crimes
1. Traditional crimes – fraud, cheating
2. Identity Theft
3. Banking frauds
4. Property Crimes – infiltration of computers with malicious
software – through email attachments, websites.
5. Theft of bandwidth
6. Crimes against businesses
9
Types of Cyber Crime
7. Misuse of Social Media Platforms, spreading of fake news
8. Defamation
9. Threats
10. Pornography
11. Hacking
12. Planting viruses
13. IPR thefts – Intellectual Property Rights
14. Ransomware
15. Tech support scams (non-existing malware, etc)
10
Challenges
1. New technologies
2. New threats
3. Complex networks
4. New vulnerabilities
5. Limited focus on security
6. Limited security expertise
11
Cyber Crime Against Individual
- Cyber stalking – use of technology to harass someone e.g.
false accusations,
- Distributing pornography
- Trafficking
- Grooming – harassment or seduction of a minor by an adult
- Spying – obtaining secrets without the permission of the
holder of information (reading another person’s email)
- Juice jacking
12
13
Cyber Crime - Hacking
- Hacking
- A person’s
computer is
broken into so that
the personal and
sensitive
information can be
stolen
14
Cyber Crime - Hacking
- Indian Websites hacked in recent past:
- 2016 – 33,147
- 2017 – 30,067
- 2018 – 15,779
- The Indian Computer Emergency Response Team (CERT-In)
issues alerts and advisories regarding latest cyber threats
and countermeasures.
15
Cyber Crime - Hacking
- Hacking
- The hacker uses a variety of software tools to get into a
computer system.
- The victim may not even be aware that his system has
been hacked
- Ethical hacking is a different concept – here organisations
may employ hacker to test their systems for weakness or
vulnerabilities
16
Cyber Crime - Theft
- Theft
- Violation of copyright laws
- Downloading music for commercial purpose
- Download images for commercial purpose
- Download games and movies without paying for them
- Some websites encourage software piracy and these
websites are now being shut down
- REMEMBER!!! – Downloading software, music, movies
and games without paying for it is a Theft
17
Cyber Crime - Stalking
- Stalking
- Online harassment
- Victim is sent numerous
messages/emails
- The stalker knows the victim
- May not be doing offline
stalking
- Remember these words –
follow, shadow, go after, be
after, trail, follow
18
Cyber Crime – Identity Theft
- Identity Theft
- Deliberate use of someone’s identity
- Someone steals your identity – name, address,
- Passport details
- That ’someone’ becomes you
- Then he/she can pretend to be you, and misuse your bank
accounts, credit cards, debit card and other sensitive
information
- He/she can buy things online in the victims name
- Causes financial loss and spoils the credit history 19
Cyber Crime – Identity Theft
- How do Attackers carry out Identity Theft?
- Phishing – fake sites are created by fraudsters who trick
victims into giving out their information
- Social Engineering – art of manipulating human emotions for
getting sensitive information
- Hacking – If victim’s computer or mobile is compromised,
hackers will get maximum information
- Personal data Theft – credit card info, checks, PAN card and
Aadhar card details.
20
Cyber Crime – Identity Theft
- What to do?
- Contact banks immediately
- Freeze your bank accounts
- Change your passwords
- Block credit / debit cards
- FIR at nearest police station
- Contact your mobile service provider and get a new SIM
card in your name
21
Cyber Crime – Identity Theft
- Frauds
- Financial frauds
- Gain control over bank accounts
- Get loans based on your identity
- Credit card frauds
- Mobile phone frauds
- Frauds pertaining to government documents
22
Cyber Crime – Malicious Software
- Malicious Software or Malware
- Such software is intentionally designed to cause damage
- These are software or programs that are used to disrupt a
network.
- Such software can be used to
- steal data
- Cause damage to a server
- Slow down or bring down a network
23
Cyber Crime – Phishing
- Phishing
- The thief (phisher) sends a deceptive email to the
recipient tricking him into providing personal account
details (username/password).
- The phisher will provide the user a link to “sign in” at an
official-looking website,
- This site looks almost identical to a real vendor’s website
with similar design but built specifically to collect personal
information.
- That information will be used against the victim later.
24
Cyber Crime – Phishing
25
Cyber Crime – Vishing
- Vishing
- Vishing uses phone to extract data through voice calls
- The visher will make cold calls to the victim posing as a
representative of the victim’s bank, income tax dept., or
insurance company
- Other times these calls will be automated with voice
prompts.
- The plan is to gain access to the victim’s financial and
personal information.
26
Cyber Crime – Vishing
27
28
29
Cyber Crime – Mobile Wallet
30
Cyber Crime – Mobile Wallet Frauds
- Transfer money from one wallet to another.
- Or, attacker will purchase goods such as mobile phone,
etc. Later they sell this to others.
- Never store a large amount on money in mobile wallet
- Never store credit/debit card details in your mobile wallet.
31
Cyber Crime – Debit/Credit Card Frauds
- Don’t keep information about your credit/debit card in
your mobile
- Remember the CVV number on your card and remove it
from the card itself.
- Money stolen from your mobile wallets can be stored in
other stolen wallets and in that case you would become
not just a victim but even the perpetrator
- Never allow apps to read your SMS – else OTP can be read
and transferred
- Don’t use public Wi-Fi to access secure data – banks, etc
32
Cyber Crime – Responsibility of Banks
33
Cyber Crime – Responsibility of Banks
34
35
36
37
38
39
40
Passwords
- 123456
- password
- 123456789
- Abc123
- admin
- !@#$%^
- Godhelpme
- Donald
- qwerty123
- Use passphrases of 12 characters or
more
- Use different password for each site
- Change password frequently
- Song/phrase/….
41
Never Respond To These
- Free credit card offers
- Credit card offers
- Lottery schemes from ANYWHERE in the world
- ‘RBI’ lottery
- Income Tax department ‘REFUND’ notice
- ‘Loan is Ready’ emails
- ‘Friendship’ emails
- Bank ‘confirmation email’
- ‘Your email account will be blocked’ emails
- Government jobs emails – Jobs? Government? Joking??
42
Safe Disposal of Old Hardware
- Companies sell their old hardware – disks, servers,
without wiping sensitive data on them.
- These servers contain credit card details, health records,
source code for controlling fire-fighting equipment, street
lights, etc
43
Cyber Crime – Cyber Terrorism
- Cyber Terrorism
- Use of Internet-based attacks in terrorist activities
- Large scale disruption of computer networks
- Use computer viruses to disable computers
- DOS attacks (Denial of Service)
44
Cyber Crime Against An Entire Country
- Business Insider (India), Dec 22, 2018
- Gatwick Airport – Britain’s 2nd busiest airport, Europe’s 8th.
- Brought to a standstill for 36 hours by – a drone and 2
people.
- What they did? – illegal flying of drones near the airport
- Army had to be called in.
45
Cyber Crime Against An Entire Country
- What happens if hackers take an entire country offline?
- Lights off
- Power supply disrupted
- Communications
- Transport – rail, air  affected
- If Temperature sensor hacked in a factory, hacker can set
up the place on fire
- Cyber terrorism becomes a means of mass destruction
- Enemy is hidden so whom to you attack?
46
Cyber Crime Against An Entire Country
- In December 2017, 3 men caused the largest internet outage in
history - a distributed "denial of service" attack
- blacked out the web across most of the US and large chunks of
Northern Europe for about 12 hours.
- How did they do it? They had disabled Dyn, a company that
provides Domain Name System (DNS) services - the web's
directory of addresses, basically - to much of the Internet.
47
Cyber Crime Against An Entire Country
In April 2018, the African country of
Mauritania was taken offline for two days
when someone cut the single undersea
cable that serves its internet.
Who did this ?
Neighbouring country Sierra Leone
48
Cyber Crime - Ransomware
 In May 2017, Wannacry virus affected Britain’s
National Health Service
 It locked up user’s computer and demanded a ransom
 By December 2017, the US govt confirmed that the
North Korean government was responsible for the
attack.
49
50
What the Internet Knows About You
“Google Will Soon Know You Better Than Your Spouse Does”
– Ray Kurzwel, Director of Engineering at Google
51
Top Global Risks in Terms of Likelihood
Extreme Weather events1
Natural Disasters2
Cyber attacks3
Data fraud or Theft4
52
Cyber War
- Cyber War is defined as “ the use of computer technology to
disrupt the activities of a state or organisation”. Also called
“bloodless war”
- Estonia – 2007
- Iran – 2010 – Stuxnet virus – affected Iranian nuclear
weapons plant. This code was installed by using USB key !
- Cyberwarfare is cheap – compared to building nuclear
missiles
- It can affect all communications, bring down power grid
53
Case Study – Cyber Attacks of Estonia
- April 27, 2007 – Estonia hit by a massive cyber DDOS
(Distributed Denial of Service) attack
- Online services of banks, govt organisations, media houses,
police were taken down due to unprecedented levels of internet
traffic
- Huge amounts of automated online requests swamped the
servers for 2 weeks
- Result?
- ATM and banking services x
- Govt employees could not communicate on email
- Broadcasters and newspapers could not deliver news 54
TEST - 1
- Pick a term that describes the following:
data, cyber, vulnerability, phishing, wishing, hacking, vishing,
information, exploit, juice jacking, threat
1. Relating to Internet _________
2. Roll No : 386 __________
3. Way to breach security _________
4. Weakness in the system _________
5. Action that can violate the security of a system ________
6. Stealing data while charging a phone ___________
55
TEST - 2
- Classify the following crimes by writing them under appropriate
columns:
Damage to source code, stalking, cyber terrorism, defamation,
damage to data, damage to communication devices, cyber war
identity theft, grooming
Crime against Persons Crimes against
Property
Crimes against
government
56
TEST - 3
Describe these terms in atleast 5 sentences
- Hacking
- Phishing
- Vishing
- Cyber terrorism
- Safe passwords
57
TEST - 4
In your own words, explain the reasons behind cyber crime
58
TEST - 5
CONGRATULATIONS!!!
You have been appointed as the Chief Information Security Officer
of the multinational bank FBN Bank.
What advice will you give to your bank customers to protect their
accounts?
59
TEST - 6
In your words describe cyber stalking and child soliciting
60
THANK YOU
PROF. MUKESH N TEKWANI
MUKESHTEKWANI@OUTLOOK.COM
Feb 4, 2019

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 

What's hot (20)

Cyber law
Cyber lawCyber law
Cyber law
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Crimes - An Introduction

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 

Similar to Cyber Crimes - An Introduction (20)

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 

More from Mukesh Tekwani

More from Mukesh Tekwani (20)

Computer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube ChannelComputer Science Made Easy - Youtube Channel
Computer Science Made Easy - Youtube Channel
 
The Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdfThe Elphinstonian 1988-College Building Centenary Number (2).pdf
The Elphinstonian 1988-College Building Centenary Number (2).pdf
 
Circular motion
Circular motionCircular motion
Circular motion
 
Gravitation
GravitationGravitation
Gravitation
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - Physics
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversion
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversion
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prism
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surface
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrors
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atom
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lenses
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
XML
XMLXML
XML
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Cyber Crimes - An Introduction

  • 1. Prof. Mukesh N Tekwani (mukeshtekwani@outlook.com)
  • 2. For Whom ? This presentation is based on the lectures delivered for students of B. Voc. (Semester 2 ) Computing Skills (TISS) at HMMRA, Vile Parle, Mumbai during January – February 2019 Contents of this presentation may also be useful to other students pursuing similar courses. --- Prof. Mukesh N Tekwani, Mumbai mukeshtekwani@outlook.com 2
  • 3. Cyber? 1. The term Cyberspace was first coined by William Gibson in 1982, in his novel Neuromancer. 2. Cyber - relating to computers, information technology and virtual reality 3
  • 4. What is Cyber Crime? 1. Any illegal activity committed using a computer and / or Internet 2. Cybercrime is - “unlawful acts wherein the computer is either a tool or a target or both”. 3. Cyber crime is an extension of existing illegal activities 4
  • 5. Causes of Cyber Crime 1. Internet makes it easy to do a cyber crime 2. ‘Crime at a distance’ - the perpetrator does not have to be at the scene of the crime 3. The criminal can be faceless – till the crime is solved, if it is solved! 4. Conviction rates are fairly low as technology makes the detection process difficult 5. Low risk – high returns – low convictions => this has led to increase in cyber crime 5
  • 6. Basic Terminology - 1 1. Threat – An event or an action that has got the ability to violate the security or to compromise the system 2. Exploit – a way to breach the security of a machine through a loophole or a vulnerability 3. Vulnerability – A weakness in the design or existence of a loop hole that could lead to undesirable or unexpected events that could compromise the security 6
  • 7. Basic Terminology - 2 4. Attacker – Any individual who compromises the security of a machine in order to steal, manipulate or cause destruction of data 5. Attack – The action that is performed by an attacker that would harm the system or the information stored in it 6. Data Theft – Action of stealing data/information from the victim’s machine 7
  • 8. Types of Cyber Crimes 1. Crimes against Persons – stalking, nuisance, harassment, defamation 2. Crimes against property – data, information, computer, communication device, damage to source code 3. Crimes against government – cyber terrorism, cyber war 4. Social media crimes 8
  • 9. Types of Cyber Crimes 1. Traditional crimes – fraud, cheating 2. Identity Theft 3. Banking frauds 4. Property Crimes – infiltration of computers with malicious software – through email attachments, websites. 5. Theft of bandwidth 6. Crimes against businesses 9
  • 10. Types of Cyber Crime 7. Misuse of Social Media Platforms, spreading of fake news 8. Defamation 9. Threats 10. Pornography 11. Hacking 12. Planting viruses 13. IPR thefts – Intellectual Property Rights 14. Ransomware 15. Tech support scams (non-existing malware, etc) 10
  • 11. Challenges 1. New technologies 2. New threats 3. Complex networks 4. New vulnerabilities 5. Limited focus on security 6. Limited security expertise 11
  • 12. Cyber Crime Against Individual - Cyber stalking – use of technology to harass someone e.g. false accusations, - Distributing pornography - Trafficking - Grooming – harassment or seduction of a minor by an adult - Spying – obtaining secrets without the permission of the holder of information (reading another person’s email) - Juice jacking 12
  • 13. 13
  • 14. Cyber Crime - Hacking - Hacking - A person’s computer is broken into so that the personal and sensitive information can be stolen 14
  • 15. Cyber Crime - Hacking - Indian Websites hacked in recent past: - 2016 – 33,147 - 2017 – 30,067 - 2018 – 15,779 - The Indian Computer Emergency Response Team (CERT-In) issues alerts and advisories regarding latest cyber threats and countermeasures. 15
  • 16. Cyber Crime - Hacking - Hacking - The hacker uses a variety of software tools to get into a computer system. - The victim may not even be aware that his system has been hacked - Ethical hacking is a different concept – here organisations may employ hacker to test their systems for weakness or vulnerabilities 16
  • 17. Cyber Crime - Theft - Theft - Violation of copyright laws - Downloading music for commercial purpose - Download images for commercial purpose - Download games and movies without paying for them - Some websites encourage software piracy and these websites are now being shut down - REMEMBER!!! – Downloading software, music, movies and games without paying for it is a Theft 17
  • 18. Cyber Crime - Stalking - Stalking - Online harassment - Victim is sent numerous messages/emails - The stalker knows the victim - May not be doing offline stalking - Remember these words – follow, shadow, go after, be after, trail, follow 18
  • 19. Cyber Crime – Identity Theft - Identity Theft - Deliberate use of someone’s identity - Someone steals your identity – name, address, - Passport details - That ’someone’ becomes you - Then he/she can pretend to be you, and misuse your bank accounts, credit cards, debit card and other sensitive information - He/she can buy things online in the victims name - Causes financial loss and spoils the credit history 19
  • 20. Cyber Crime – Identity Theft - How do Attackers carry out Identity Theft? - Phishing – fake sites are created by fraudsters who trick victims into giving out their information - Social Engineering – art of manipulating human emotions for getting sensitive information - Hacking – If victim’s computer or mobile is compromised, hackers will get maximum information - Personal data Theft – credit card info, checks, PAN card and Aadhar card details. 20
  • 21. Cyber Crime – Identity Theft - What to do? - Contact banks immediately - Freeze your bank accounts - Change your passwords - Block credit / debit cards - FIR at nearest police station - Contact your mobile service provider and get a new SIM card in your name 21
  • 22. Cyber Crime – Identity Theft - Frauds - Financial frauds - Gain control over bank accounts - Get loans based on your identity - Credit card frauds - Mobile phone frauds - Frauds pertaining to government documents 22
  • 23. Cyber Crime – Malicious Software - Malicious Software or Malware - Such software is intentionally designed to cause damage - These are software or programs that are used to disrupt a network. - Such software can be used to - steal data - Cause damage to a server - Slow down or bring down a network 23
  • 24. Cyber Crime – Phishing - Phishing - The thief (phisher) sends a deceptive email to the recipient tricking him into providing personal account details (username/password). - The phisher will provide the user a link to “sign in” at an official-looking website, - This site looks almost identical to a real vendor’s website with similar design but built specifically to collect personal information. - That information will be used against the victim later. 24
  • 25. Cyber Crime – Phishing 25
  • 26. Cyber Crime – Vishing - Vishing - Vishing uses phone to extract data through voice calls - The visher will make cold calls to the victim posing as a representative of the victim’s bank, income tax dept., or insurance company - Other times these calls will be automated with voice prompts. - The plan is to gain access to the victim’s financial and personal information. 26
  • 27. Cyber Crime – Vishing 27
  • 28. 28
  • 29. 29
  • 30. Cyber Crime – Mobile Wallet 30
  • 31. Cyber Crime – Mobile Wallet Frauds - Transfer money from one wallet to another. - Or, attacker will purchase goods such as mobile phone, etc. Later they sell this to others. - Never store a large amount on money in mobile wallet - Never store credit/debit card details in your mobile wallet. 31
  • 32. Cyber Crime – Debit/Credit Card Frauds - Don’t keep information about your credit/debit card in your mobile - Remember the CVV number on your card and remove it from the card itself. - Money stolen from your mobile wallets can be stored in other stolen wallets and in that case you would become not just a victim but even the perpetrator - Never allow apps to read your SMS – else OTP can be read and transferred - Don’t use public Wi-Fi to access secure data – banks, etc 32
  • 33. Cyber Crime – Responsibility of Banks 33
  • 34. Cyber Crime – Responsibility of Banks 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. 38
  • 39. 39
  • 40. 40
  • 41. Passwords - 123456 - password - 123456789 - Abc123 - admin - !@#$%^ - Godhelpme - Donald - qwerty123 - Use passphrases of 12 characters or more - Use different password for each site - Change password frequently - Song/phrase/…. 41
  • 42. Never Respond To These - Free credit card offers - Credit card offers - Lottery schemes from ANYWHERE in the world - ‘RBI’ lottery - Income Tax department ‘REFUND’ notice - ‘Loan is Ready’ emails - ‘Friendship’ emails - Bank ‘confirmation email’ - ‘Your email account will be blocked’ emails - Government jobs emails – Jobs? Government? Joking?? 42
  • 43. Safe Disposal of Old Hardware - Companies sell their old hardware – disks, servers, without wiping sensitive data on them. - These servers contain credit card details, health records, source code for controlling fire-fighting equipment, street lights, etc 43
  • 44. Cyber Crime – Cyber Terrorism - Cyber Terrorism - Use of Internet-based attacks in terrorist activities - Large scale disruption of computer networks - Use computer viruses to disable computers - DOS attacks (Denial of Service) 44
  • 45. Cyber Crime Against An Entire Country - Business Insider (India), Dec 22, 2018 - Gatwick Airport – Britain’s 2nd busiest airport, Europe’s 8th. - Brought to a standstill for 36 hours by – a drone and 2 people. - What they did? – illegal flying of drones near the airport - Army had to be called in. 45
  • 46. Cyber Crime Against An Entire Country - What happens if hackers take an entire country offline? - Lights off - Power supply disrupted - Communications - Transport – rail, air  affected - If Temperature sensor hacked in a factory, hacker can set up the place on fire - Cyber terrorism becomes a means of mass destruction - Enemy is hidden so whom to you attack? 46
  • 47. Cyber Crime Against An Entire Country - In December 2017, 3 men caused the largest internet outage in history - a distributed "denial of service" attack - blacked out the web across most of the US and large chunks of Northern Europe for about 12 hours. - How did they do it? They had disabled Dyn, a company that provides Domain Name System (DNS) services - the web's directory of addresses, basically - to much of the Internet. 47
  • 48. Cyber Crime Against An Entire Country In April 2018, the African country of Mauritania was taken offline for two days when someone cut the single undersea cable that serves its internet. Who did this ? Neighbouring country Sierra Leone 48
  • 49. Cyber Crime - Ransomware  In May 2017, Wannacry virus affected Britain’s National Health Service  It locked up user’s computer and demanded a ransom  By December 2017, the US govt confirmed that the North Korean government was responsible for the attack. 49
  • 50. 50
  • 51. What the Internet Knows About You “Google Will Soon Know You Better Than Your Spouse Does” – Ray Kurzwel, Director of Engineering at Google 51
  • 52. Top Global Risks in Terms of Likelihood Extreme Weather events1 Natural Disasters2 Cyber attacks3 Data fraud or Theft4 52
  • 53. Cyber War - Cyber War is defined as “ the use of computer technology to disrupt the activities of a state or organisation”. Also called “bloodless war” - Estonia – 2007 - Iran – 2010 – Stuxnet virus – affected Iranian nuclear weapons plant. This code was installed by using USB key ! - Cyberwarfare is cheap – compared to building nuclear missiles - It can affect all communications, bring down power grid 53
  • 54. Case Study – Cyber Attacks of Estonia - April 27, 2007 – Estonia hit by a massive cyber DDOS (Distributed Denial of Service) attack - Online services of banks, govt organisations, media houses, police were taken down due to unprecedented levels of internet traffic - Huge amounts of automated online requests swamped the servers for 2 weeks - Result? - ATM and banking services x - Govt employees could not communicate on email - Broadcasters and newspapers could not deliver news 54
  • 55. TEST - 1 - Pick a term that describes the following: data, cyber, vulnerability, phishing, wishing, hacking, vishing, information, exploit, juice jacking, threat 1. Relating to Internet _________ 2. Roll No : 386 __________ 3. Way to breach security _________ 4. Weakness in the system _________ 5. Action that can violate the security of a system ________ 6. Stealing data while charging a phone ___________ 55
  • 56. TEST - 2 - Classify the following crimes by writing them under appropriate columns: Damage to source code, stalking, cyber terrorism, defamation, damage to data, damage to communication devices, cyber war identity theft, grooming Crime against Persons Crimes against Property Crimes against government 56
  • 57. TEST - 3 Describe these terms in atleast 5 sentences - Hacking - Phishing - Vishing - Cyber terrorism - Safe passwords 57
  • 58. TEST - 4 In your own words, explain the reasons behind cyber crime 58
  • 59. TEST - 5 CONGRATULATIONS!!! You have been appointed as the Chief Information Security Officer of the multinational bank FBN Bank. What advice will you give to your bank customers to protect their accounts? 59
  • 60. TEST - 6 In your words describe cyber stalking and child soliciting 60
  • 61. THANK YOU PROF. MUKESH N TEKWANI MUKESHTEKWANI@OUTLOOK.COM Feb 4, 2019