SlideShare a Scribd company logo
1 of 27
Hello!
We are,
Deepak Kumar
Jayati Chaube
Patal Sharma
Samradhi Basar
Yash Paunikar 2
Cyber Security
3
“
○ Cybersecurity is the protection of
internet-connected systems, including
hardware, software and data, from
cyber attacks
○ In a computing context, security
comprises cybersecurity and physical
security -- both are used by enterprises
to protect against unauthorized access
to data centres and other computerized
systems. Information security, which is
designed to maintain the confidentiality,
integrity and availability of data, is a
subset of cybersecurity 4
What is Cyber Security
“ ○ Information security
○ Disaster recovery
○ Network security
5
Types of Cyber Securities
○ Everyone seems to be going cashless, using digital
money, i.e. Debit Cards and credit cards. In this
context, it becomes very important to ensure that all
measures of cyber security are in place, to protect
your data and your privacy
○ Data breaches can make it difficult to trust financial
institutions. For banks, that's a serious problem. A
weak cyber security system can amount to data
breaches that could easily cause their customer base
to take its money elsewhere
6
Importance of Cyber Security in Banks
○ You often tend to lose time and money when a bank's
data is breached. Recovering from the same can be
time-consuming and stressful. It would involve
cancelling cards, checking statements, and keeping
your eyes open for complications
○ Your private data in the wrong hands can do great
harm. Even if the cards are cancelled, and fraud is
immediately taken care of, your data is sensitive and
could reveal a lot of information that could be used
against you
○ Banks need to be on their guard more than most
businesses. That's the cost of holding onto the kind
of valuable personal data that banks do. Your data
with the bank can be breached if not protected from
cybercrime threats
7
○ Unencrypted Data
○ New automation technology without
Security
○ Unprotected Third Party Services
○ Unsecured Mobile banking
○ A constantly changing threat landscape
○ False Positives
○ The Big Breach
8
Major Cybersecurity Threats in
Banking Sector
Cyber Crime
9
“
○ Cyber crime encompasses any criminal
act dealing with computers
and networks (called hacking).
Additionally, cyber crime also includes
traditional crimes conducted through
the Internet
○ For example; hate crimes, telemarketing
and Internet fraud, identity theft, and
credit card account thefts are
considered to be cyber crimes when the
illegal activities are committed through
the use of a computer and the Internet
10
What is Cyber Crime
○ Hacking
○ Virus dissemination
○ Logic bomb
○ Denial-of-Service attack
○ Email bombing and spamming
○ Web Jacking
○ Data diddling
○ Identity theft and Credit Card Fraud
○ Cyber Stalking
○ Ransomware
○ Phishing
11
Types Of Cyber Crime
Phishing
12
“
○ Phishing is a cybercrime in which a
target or targets are contacted by email,
telephone or text message by someone
posing as a legitimate institution to lure
individuals into providing sensitive
data such as personally identifiable
information, banking and credit card
details, and passwords
○ The information is then used to access
important accounts and can result in
identity theft and financial loss
13
What is Phishing
○ Phish Tank (2006)
○ Anti Phishing Working Group (2003)
14
Anti Phishing Group
Ransomware
15
“
○ It is a type of malware that prevents user
from accessing their personal files and
demand ransom payment in order to
regain access
○ The most dangerous ransomware attacks
are caused
by WannaCry, Petya, Cerber, Locky and
CryptoLocker ransomware
○ Ransomware is created by scammers who
are highly knowledgeable in computer
programming. It can enter your PC
through an email attachment or through
your browser if you happen to visit a
website that is infected with this type of
malware
16
What is Ransomware
○ It's obvious when your device has
been infected with ransomware,
since you most likely won't be
able to access your computer
17
How to recognize
ransomware
Cyber Bank
Frauds
18
“
19
What are bank frauds
○ Bank fraud is the use of potentially
illegal means to obtain money, assets,
or other property owned or held by a
financial institution, or to obtain money
from depositors by fraudulently posing
as a bank or other financial institution
○ Bank fraud is considered to be a white
collar crime
“
○ Security breaches at Indian banks have
happened in the past, too. In 2016, in one of the
biggest ever breaches of financial data in India,
credit and debit cards of 3.2 million banking
customers were compromised. This was caused
by a malware in the systems
of Hitachi Payments Services, which runs and
manages ATM networks.
○ Ninety of Yes Bank ATMs that were managed by
Hitachi were affected and data from cards used
at these ATMs were stolen. The recent malware
case comes at a time when mobile banking
transactions have been on the rise. Between
2015 and 2017, digital payment transactions
have grown at an average annual pace of more
than 50%, and instances of data thefts like these
can be a huge deterrent.
20
THE CURRENT THREAT LANDSCAPE
 50 incidents of cyber attacks affecting 19 financial
organizations have been reported from 2016 till June 2017
 3 government-owned banks were infiltrated by attackers to create fake
trade documents like letters of credit (LC) and guarantees
 Since June 2016, SWIFT systems of 4 Indian banks have been targeted.
 Bangladesh Bank official's computer was hacked to carry out a
 $81 million heist
 In 2016, banks in India had to reissue 3 million debit cards and faced a
combined loss of more than $2 million after hackers allegedly penetrated
the system of Hitachi
 Cyber attacks against financial services cost consumers £8bn
 in 2016, research reveals 21
GLIMPESFROM
Preventions
22
○ Although originally invented for the
cryptocurrencies (bitcoins), Blockchain
technology can be very useful for tightening
cybersecurity
○ Blockchain could reduce banks infrastructure
costs by US$ 15-20 billion per annum by 2022
○ Owing to their distributed nature, blockchains
provide no ‘hackable’ entrance or a central point
of failure and, thereby, provide more security
when compared with various present
database-driven transactional structures
23
Implementing Blockchain Technology
for Cyber Security
Case Study
24
○ Hackers managed to siphon off over Rs 94
crore through a malware attack on the
server of pune based cosmos bank
○ Transactions were carried out on August
11 and August 13 in 2018
○ In two days – 79 crore from various ATMs
in 28 countries and another 2.5 crore were
taken out within India 25
COSMOS BANK’S (PUNE)
○ Hackers were able to send fake
transaction reply(TRE) messages in
response to transaction request (TRQ)
○ The incident was done by-”LAZARUS
GROUP”(the elite group of hackers
maintain by NORTH KOREAN regime)
○ Same group was blamed for devastating
success of the “WANNA CRY
RANSOMWARE” last year.
26
27
Thanks!
Any questions?

More Related Content

What's hot

Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cryptocurrencies and AML
Cryptocurrencies and AMLCryptocurrencies and AML
Cryptocurrencies and AMLMinerva
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 

What's hot (20)

Computer hacking
Computer hackingComputer hacking
Computer hacking
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
case study (1).pptx
 case study (1).pptx case study (1).pptx
case study (1).pptx
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cryptocurrencies and AML
Cryptocurrencies and AMLCryptocurrencies and AML
Cryptocurrencies and AML
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber security and Cyber Crime

Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Introduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber SecurityIntroduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber Securitypivisoc989
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
 

Similar to Cyber security and Cyber Crime (20)

12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Introduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber SecurityIntroduction to Computer Forensics & Cyber Security
Introduction to Computer Forensics & Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Cyber security and Cyber Crime

  • 1.
  • 2. Hello! We are, Deepak Kumar Jayati Chaube Patal Sharma Samradhi Basar Yash Paunikar 2
  • 4. “ ○ Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyber attacks ○ In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centres and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity 4 What is Cyber Security
  • 5. “ ○ Information security ○ Disaster recovery ○ Network security 5 Types of Cyber Securities
  • 6. ○ Everyone seems to be going cashless, using digital money, i.e. Debit Cards and credit cards. In this context, it becomes very important to ensure that all measures of cyber security are in place, to protect your data and your privacy ○ Data breaches can make it difficult to trust financial institutions. For banks, that's a serious problem. A weak cyber security system can amount to data breaches that could easily cause their customer base to take its money elsewhere 6 Importance of Cyber Security in Banks
  • 7. ○ You often tend to lose time and money when a bank's data is breached. Recovering from the same can be time-consuming and stressful. It would involve cancelling cards, checking statements, and keeping your eyes open for complications ○ Your private data in the wrong hands can do great harm. Even if the cards are cancelled, and fraud is immediately taken care of, your data is sensitive and could reveal a lot of information that could be used against you ○ Banks need to be on their guard more than most businesses. That's the cost of holding onto the kind of valuable personal data that banks do. Your data with the bank can be breached if not protected from cybercrime threats 7
  • 8. ○ Unencrypted Data ○ New automation technology without Security ○ Unprotected Third Party Services ○ Unsecured Mobile banking ○ A constantly changing threat landscape ○ False Positives ○ The Big Breach 8 Major Cybersecurity Threats in Banking Sector
  • 10. “ ○ Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet ○ For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet 10 What is Cyber Crime
  • 11. ○ Hacking ○ Virus dissemination ○ Logic bomb ○ Denial-of-Service attack ○ Email bombing and spamming ○ Web Jacking ○ Data diddling ○ Identity theft and Credit Card Fraud ○ Cyber Stalking ○ Ransomware ○ Phishing 11 Types Of Cyber Crime
  • 13. “ ○ Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords ○ The information is then used to access important accounts and can result in identity theft and financial loss 13 What is Phishing
  • 14. ○ Phish Tank (2006) ○ Anti Phishing Working Group (2003) 14 Anti Phishing Group
  • 16. “ ○ It is a type of malware that prevents user from accessing their personal files and demand ransom payment in order to regain access ○ The most dangerous ransomware attacks are caused by WannaCry, Petya, Cerber, Locky and CryptoLocker ransomware ○ Ransomware is created by scammers who are highly knowledgeable in computer programming. It can enter your PC through an email attachment or through your browser if you happen to visit a website that is infected with this type of malware 16 What is Ransomware
  • 17. ○ It's obvious when your device has been infected with ransomware, since you most likely won't be able to access your computer 17 How to recognize ransomware
  • 19. “ 19 What are bank frauds ○ Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution ○ Bank fraud is considered to be a white collar crime
  • 20. “ ○ Security breaches at Indian banks have happened in the past, too. In 2016, in one of the biggest ever breaches of financial data in India, credit and debit cards of 3.2 million banking customers were compromised. This was caused by a malware in the systems of Hitachi Payments Services, which runs and manages ATM networks. ○ Ninety of Yes Bank ATMs that were managed by Hitachi were affected and data from cards used at these ATMs were stolen. The recent malware case comes at a time when mobile banking transactions have been on the rise. Between 2015 and 2017, digital payment transactions have grown at an average annual pace of more than 50%, and instances of data thefts like these can be a huge deterrent. 20
  • 21. THE CURRENT THREAT LANDSCAPE  50 incidents of cyber attacks affecting 19 financial organizations have been reported from 2016 till June 2017  3 government-owned banks were infiltrated by attackers to create fake trade documents like letters of credit (LC) and guarantees  Since June 2016, SWIFT systems of 4 Indian banks have been targeted.  Bangladesh Bank official's computer was hacked to carry out a  $81 million heist  In 2016, banks in India had to reissue 3 million debit cards and faced a combined loss of more than $2 million after hackers allegedly penetrated the system of Hitachi  Cyber attacks against financial services cost consumers £8bn  in 2016, research reveals 21 GLIMPESFROM
  • 23. ○ Although originally invented for the cryptocurrencies (bitcoins), Blockchain technology can be very useful for tightening cybersecurity ○ Blockchain could reduce banks infrastructure costs by US$ 15-20 billion per annum by 2022 ○ Owing to their distributed nature, blockchains provide no ‘hackable’ entrance or a central point of failure and, thereby, provide more security when compared with various present database-driven transactional structures 23 Implementing Blockchain Technology for Cyber Security
  • 25. ○ Hackers managed to siphon off over Rs 94 crore through a malware attack on the server of pune based cosmos bank ○ Transactions were carried out on August 11 and August 13 in 2018 ○ In two days – 79 crore from various ATMs in 28 countries and another 2.5 crore were taken out within India 25 COSMOS BANK’S (PUNE)
  • 26. ○ Hackers were able to send fake transaction reply(TRE) messages in response to transaction request (TRQ) ○ The incident was done by-”LAZARUS GROUP”(the elite group of hackers maintain by NORTH KOREAN regime) ○ Same group was blamed for devastating success of the “WANNA CRY RANSOMWARE” last year. 26