SlideShare a Scribd company logo
1 of 46
Cyber Crime
Because –
īƒ˜ Everybody is using COMPUTERS
īƒ˜ From white collar criminals to terrorist organizations
 And from Teenagers to Adults
īƒ˜ Conventional crimes like
 Forgery,, extortion, kidnapping etc are being
 committed with the help off computers
īƒ˜ New generation is growing up with computers
īƒ˜ MOST IMPORTANT - Monetary transactions
  are moving on to the IINTERNET
WHAT IS CYBER
Cyber crime is defined as crimes committed on the
internet using the computer as either a tool or a targeted
victim. It is very difficult to classify crimes in general into
distinct groups as many crimes evolve on a daily basis. Even
in the real world, crimes like rape, murder or theft need not
necessarily be separate. However, all cybercrimes involve
both the computer and the person behind it as victims, it
just depends on which of the two is the main target.
Hence, the computer will be looked at as either a target or
tool for simplicity’s sake. For example, hacking involves
attacking the computer’s information and other resources.
It is important to take note that overlapping occurs in
many cases and it is impossible to have a perfect
classification system.
Like traditional crime, cybercrime can take many shapes
 and can occur nearly anytime or anyplace. Criminals
 committing       cybercrime     use      a    number    of
 methods, depending on their skill-set and their goal. This
 should not be surprising: cybercrime is, after all, simply
 'crime' with some sort of 'computer' or 'cyber' aspect.


īƒ˜ Every 3 seconds an identity is stolen**
īƒ˜ Without security, your unprotected PC can
  become infected within four minutes of
  connecting to the internet***
īƒ˜ Cybercrime has surpassed illegal drug trafficking
  as a criminal moneymaker*
The Council of Europe's Cybercrime Treaty uses the term
    'cybercrime' to refer to offenses ranging from criminal activity
    against data to content and copyright infringement
    [Krone, 2005]. However, others [Zeviar-Geese, 1997-98] suggest
    that the definition is broader, including activities such as
    fraud, unauthorized access, child pornography, and cyber
    stalking. The United Nations Manual on the Prevention and
    Control of Computer Related Crime includes fraud, forgery, and
    unauthorized access [United Nations, 1995] in its cybercrime
    definition.

    References
    *“Cybercrime More Profitable Than Drugs”, NineMSN
    **Identity Theft Statistics, Identity Protection Online
    ***“Eliminating Mobile Security Blindfolds”, Tech News World
ī‚—
    Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN
    1832-3413. 2005.
    Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the
    Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.
Profile of Cyber Criminal
īƒ˜ Disgruntled employees
īƒ˜ Teenagers
īƒ˜ Political Hacktivist
īƒ˜ Professional Hackers
īƒ˜ Business Rival
īƒ˜ Ex-Boy Friend
īƒ˜ Divorced Husband.etc
VICTIMS
īƒ˜ Gullible
īƒ˜ Desperados and greedy people
īƒ˜ Unskilled & Inexperienced
īƒ˜ Unlucky people
Computer Crimes are Vulnerable
Because off :-
īƒ˜Anonymity
īƒ˜Computer's storage capacity
īƒ˜Weakness in Operating System
īƒ˜Lack off Awareness off user
TYPES OF CYBER CRIME
â€ĸ HACKING
â€ĸ DENIAL OF SERVICE ATTACK
â€ĸ COMPUTER VIRUS
â€ĸ SOFTWARE PIRACY
â€ĸ PORNOGRAPHY
â€ĸ IRC Crime
â€ĸ CREDIT CARD FRAUD
â€ĸ SPAMMING

                             â€ĸ PHISHING
                             â€ĸ SPOOFING
                             â€ĸ CYBER STALKING
                             â€ĸ CYBER DEFAMATION
                             â€ĸ THREATENING
                             â€ĸ SALAMI ATTACK
HACKING
Hacking in simple terms means illegal intrusion into
a computer system without the permission of the
computer owner/user. The most prominent definition of
hacking is the act of gaining access without legal
authorization to a computer or computer network. A
hacker first attacks an easy target, and then uses it to hide
his or her traces for launching attacks at more secure sites.
The goal of an attack is to gain complete control of the
system (so you can edit, delete, install, or execute any file
in any user’s directory), often by gaining access to a "super-
user" account. This will allow both maximum access and
the ability to hide your presence.
COMPUTER VIRUS
A computer virus is a computer program that can copy itself and
infect a computer without permission or knowledge of the user.
The original may modify the copies or the copies may modify
themselves. A virus can only spread from one computer to
another when its host is taken to the uninfected computer, for
instance by a user sending it over a network or carrying it on a
removable medium such as a floppy disk, CD, or USB drive.
Additionally, viruses can spread to other computers by infecting
files on a network file system or a file system that is accessed by
another computer.
The term comes from the term virus in biology. A computer
virus reproduces by making, possibly modified, copies of itself
in the computer's memory, storage, or over a network. This is
similar to the way a biological virus works
SOFTWARE PIRACY

īƒ˜ Theft of software through the illegal copying of genuine
  programs or the counterfeiting and distribution of
  products intended to pass for the original

īƒ˜ Retail revenue losses worldwide are ever increasing due to
  this crime

īƒ˜ Can be done in various ways-
  End user copying,, Hard disk loading,, Counterfeiting,, Illegal
  downloads from the internet etc
PORNOGRAPHY
īƒ˜ Pornography is the first consistently successful ecommerce
  product

īƒ˜ Deceptive    marketing tactics and mouse trapping
  technologies Pornography encourage customers to access
  their websites

īƒ˜ Anybody including children can log on to the internet and
  access websites with pornographic contents with a click of
  a mouse

īƒ˜ Publishing, transmitting any material in electronic form
  which is lascivious or appeals to the prurient interest is an
  offence under the provisions of section 67 of I.T. Act -2000.
IRC CRIME
  Internet Relay Chat (IRC) servers have chat rooms in which
  people from anywhere the world can come together and
  chat with each other

īƒ˜ Criminals use it for meeting coconspirators

īƒ˜ Hackers use it for discussing their exploits / sharing the
  techniques

īƒ˜ Pedophiles use chat rooms to allure small children

īƒ˜ Cyber Stalking - In order to harass a woman her telephone
  number is given to others as if she wants to befriend males
CREDIT CARD FRAUD
You simply have to type credit card number into www
page off the vendor for online transaction.

If electronic transactions are not secured the credit
card numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card
owner
Credit card skimmer
Skimmer
How the credit card skimmer is used
Credit Card Writer
1- ATM machine as usual ?
2- Is there an additional slot ?
3- A monitor and pamphlet holder at the side...nothing wrong
5-False pamphlet box affixed to the ATM cubicle side
6-Inside the “pamphlet box”
SPAMMING
Spamming is the abuse of electronic messaging systems to send
unsolicited bulk messages, which are generally undesired. While the
most widely recognized form of spam is email spam, the term is
applied to similar abuses in other media: instant messaging
spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, mobile phone messaging spam, internet forum spam and junk
fax transmissions.
Spamming is economically viable because advertisers have no
operating costs beyond the management of their mailing lists, and it is
difficult to hold senders accountable for their mass mailings. Because
the barrier to entry is so low, spammers are numerous, and the volume
of unsolicited mail has become very high. The costs, such as lost
productivity and fraud, are borne by the public and by Internet service
providers, which have been forced to add extra capacity to cope with
the deluge. Spamming is widely reviled, and has been the subject of
legislation in many jurisdictions.
PHISHING
It is technique of pulling out confidential information from
the bank/financial institutional account holders by
deceptive means
In most cases, phishers send out a wave of spam
email, sometimes up to millions of messages. Each email
contains a message that appears to come from a well-
known and trusted company. Usually the message includes
the company's logo and name, and it often tries to evoke an
emotional response to a false crisis. Couched in
urgent, business-like language, the email often makes a
request of the user’s personal information. Sometimes the
email directs the recipient to a spoofed Web site. The Web
site, like the email, appears authentic and in some
instances its URL has been masked so the Web address
looks real.
Spoofing
Getting one computer on a network to pretend to have the
identity off another computer,, usually one with special
access privileges ,, so as to obtain access to the other
computers on the network.
A common misconception is that "IP spoofing" can be used
to hide your IP address while surfing the Internet, chatting
on-line, sending e-mail, and so forth. This is generally not
true. Forging the source IP address causes the responses to
be misdirected, meaning you cannot create a normal
network connection. However, IP spoofing is an integral
part of many network attacks that do not need to see
responses (blind spoofing).
DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the
bandwidth of the victim's network or fill's his e-mail
box with spam mail depriving him of the services he
is entitled to access or provide
CYBER STALKING
The Criminal follows the victim by            sending
emails, entering the chat rooms frequently.
CYBER DEFAMATION
The Criminal sends emails containing defamatory
matters to all concerned off the victim or post the
defamatory matters on a website.

(disgruntled employee may do this against boss,, ex-
boys friend against girl,, divorced husband against wife
etc)
THREATENING
The Criminal sends threatening email or comes in
contact in chat rooms with victim.
(Any one disgruntled may do this against boss,, friend
or official)
SALAMI ATTACK
In such crime criminal makes insignificant changes in
such a manner that such changes would go unnoticed.

Criminal makes such program that deducts small
amount like Rs. 2.50 per month from the account of all
the customer of the Bank and deposit the same in his
account. In this case no account holder will approach
the bank for such small amount but criminal gains
huge amount.
SALE OF NARCOTICS
īƒ˜ Sale & Purchase through net


īƒ˜ There are web site which offset sale and shipment off
 contrabands drugs

īƒ˜ They may use the techniques off stenography for
 hiding the messages
Now in its tenth year, the Internet Crime Complaint Center (IC3) has
become a vital resource for victims of online crime and for law
enforcement investigating and prosecuting offenders.

In 2010, IC3 received the second-highest number of complaints since its
inception. IC3 also reached a major milestone this year when it received
its two-millionth complaint. On average, IC3 receives and processes
25,000 complaints per month.

IC3 is more than a repository for victim complaints. It serves as a conduit
for law enforcement to share information and pursue cases that often
span jurisdictional boundaries. IC3 was founded in 2000 as a joint effort
between the National White Collar Crime Center (NW3C)/Bureau of
Justice Assistance (BJA) and the Federal Bureau of Investigation (FBI).
That                partnership              leveraged                  the
resources necessary to aid law enforcement in every aspect of an
Internet fraud complaint.

The most common victim complaints in 2010 were non-delivery
of payment/merchandise, scams impersonating the FBI
(hereafter “FBI-related scams”) and identity theft. Victims of
these crimes reported losing hundreds of millions of dollars.

Through a number of technological advancements, IC3 has
streamlined the way it processes and refers victim complaints to
law enforcement. In 2004, IC3 developed Automatch, an
automated internal complaint grouping and analytical search
tool. The design of Automatch is based on an assessment of the
IC3 partnership aimed at defining a joint workflow for the
project partners with different service requirements. IC3 IT staff
continually review and update
Automatch to meet the needs of analysts who build cases
for law enforcement worldwide gathering all related
information based on commonalities in the IC3 data. In
2009, NW3C developed the state-of-the-art Internet
Complaint Search and Investigation System (ICSIS), which
fosters seamless collaboration among law enforcement
from multiple jurisdictions.

Expert IC3 analysts also provide key analytical and case
support.

The 2010 Internet Crime Report demonstrates how
pervasive online crime has become, affecting people in all
demographic groups. The report provides specific details
about various crimes, their victims and the perpetrators. It
also shows how IC3 continually adapts its methods to meet
the needs of the public and law enforcement.
Type Percent
1. Non-delivery Payment/Merchandise 14.4%
2. FBI-Related Scams 13.2%
3. Identity Theft 9.8%
4. Computer Crimes 9.1%
5. Miscellaneous Fraud 8.6%
6. Advance Fee Fraud 7.6%
7. Spam 6.9%
8. Auction Fraud 5.9%
9. Credit Card Fraud 5.3%
10. Overpayment Fraud 5.3%
UN RESOLUTION
ī‚— A broad, inclusive focus is necessary to address problems of
  cybercrime, going beyond criminal law, penal procedures and
  law enforcement. The focus should include requirements for the
  secure functioning of a cyber-economy optimizing business
  confidence and individual privacy, as well as strategies to
  promote and protect the innovation and wealth-creating
  potential and opportunities of information and computing
  technologies, including early warning and response mechanisms
  in case of cyber attacks. Behind the prevention and prosecution
  of computer-related crime looms the larger challenge of creating
  a global culture of cyber security, addressing the needs of all
  societies, including developing countries, with their emerging
  and still vulnerable information technology structures.
EU RESOLUTION
The European Commission adopted a proposal for new laws against
cybercrime to harmonies laws that deal with hacking, viruses and
denial of service attacks. All EU Member States are also members of
the Council of Europe which recently agreed a Cybercrime Convention
with the same aim
                                 ī‚—
The Commission adopted its proposal for a Council Framework
Decision on "Attacks against information systems" seeks to ensure that
Europe's law enforcement and judicial authorities can take action
against crimes for which existing laws were not designed. It also aims to
encourage       and     promote      information   security.     Antonio
Vitorino, European Commissioner for Justice and Home Affairs, said:
"Member States' laws contain some significant gaps which could
hamper the ability of law enforcement and judicial authorities to
respond to crimes against information systems. Given the trans-
national nature of hacking, virus and denial of service attacks, it is
important that the European Union takes action in this area to ensure
effective police and judicial co-operation."
DOs or DONTs
What you should not do
īƒ˜ Expose yourself that you are not available in town or give your details
  about location and itinerary when email auto responder enabled

īƒ˜ Hand over your credit card to any person

īƒ˜ Auto-connect to open Wi-Fi (wireless fidelity) networks

īƒ˜ Get confused, frightened or pressured into divulging information if you
  receive an e-mail purporting to be from your bank or credit card
  provider as criminal use scare tactics

īƒ˜ Keep passwords stored on your computer
īƒ˜ Open email attachment if you are not sure about it.

īƒ˜ Assume a company is legitimate based on
  "appearance" of the website.

īƒ˜ Be wary of investments that offer high returns at little
  or no risk.

īƒ˜ Accept packages that you didn't order.

īƒ˜ Go online without virus protection and a firewall in
  place.
What you should do
īƒ˜ Install and use a firewall, pop-up blocker and spyware detector


īƒ˜ Ensure that your virus definitions are up to date and run anti-virus and
  spyware detectors/cleaners regularly

īƒ˜ Make Backups of Important Files and Folders to protect important files
  and records on your computer if your computer malfunctions or is
  damaged by a successful attacker

īƒ˜ Use strong passwords - Easy to remember and difficult to guess type
  password. Use alphanumeric and special characters in your password.
  The length of password should be as long as possible (More than 8
  characters)
ī‚— Use a variety of passwords, not same for all of your accounts

ī‚— Be extremely wary of spam legitimate looking email asking for
  confidential information. Never ever click on the link given in the spam
  email.

ī‚— Always delete spam emails immediately and empty the trash box to
  prevent accidental clicking on the same link.

ī‚— Be wary of websites that require your card details up front before you
  actually place an order.

ī‚— Not to believe everything you read online

ī‚— Take your time - do not rush into things
Reference
*“Cybercrime More Profitable Than Drugs”, NineMSN
    **Identity Theft Statistics, Identity Protection Online
    ***“Eliminating Mobile Security Blindfolds”, Tech News
    World
ī‚—
    Krone, T., 2005. High Tech Crime Brief. Australian Institute
    of Criminology. Canberra, Australia. ISSN 1832-3413. 2005.
    Zeviar-Geese, G. 1997-98. The State of the Law on Cyber
    jurisdiction and Cybercrime on the Internet. California
    Pacific School of Law. Gonzaga Journal of International
    Law. Volume 1. 1997-1998.

More Related Content

What's hot

Cyber crime
Cyber crime Cyber crime
Cyber crime
Jayant Raj
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

What's hot (20)

cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 

Similar to Cyber crime

Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Computer crime
Computer crimeComputer crime
Computer crime
Vishesh Dalal
 

Similar to Cyber crime (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
My presentation
My presentationMy presentation
My presentation
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 

More from Md. Atiqur Rahman

More from Md. Atiqur Rahman (8)

PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Aminoglycosides
AminoglycosidesAminoglycosides
Aminoglycosides
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
 
Collective bargaining
Collective bargainingCollective bargaining
Collective bargaining
 
Switchgear Equipment in a Substation
Switchgear Equipment in a SubstationSwitchgear Equipment in a Substation
Switchgear Equipment in a Substation
 
Function of commercial banks in bangladesh
Function of commercial banks in bangladeshFunction of commercial banks in bangladesh
Function of commercial banks in bangladesh
 
Power genaration in bangladesh
Power genaration in bangladeshPower genaration in bangladesh
Power genaration in bangladesh
 

Recently uploaded

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸĨ° 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Cyber crime

  • 2. Because – īƒ˜ Everybody is using COMPUTERS īƒ˜ From white collar criminals to terrorist organizations And from Teenagers to Adults īƒ˜ Conventional crimes like Forgery,, extortion, kidnapping etc are being committed with the help off computers īƒ˜ New generation is growing up with computers īƒ˜ MOST IMPORTANT - Monetary transactions are moving on to the IINTERNET
  • 3. WHAT IS CYBER Cyber crime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. It is very difficult to classify crimes in general into distinct groups as many crimes evolve on a daily basis. Even in the real world, crimes like rape, murder or theft need not necessarily be separate. However, all cybercrimes involve both the computer and the person behind it as victims, it just depends on which of the two is the main target. Hence, the computer will be looked at as either a target or tool for simplicity’s sake. For example, hacking involves attacking the computer’s information and other resources. It is important to take note that overlapping occurs in many cases and it is impossible to have a perfect classification system.
  • 4. Like traditional crime, cybercrime can take many shapes and can occur nearly anytime or anyplace. Criminals committing cybercrime use a number of methods, depending on their skill-set and their goal. This should not be surprising: cybercrime is, after all, simply 'crime' with some sort of 'computer' or 'cyber' aspect. īƒ˜ Every 3 seconds an identity is stolen** īƒ˜ Without security, your unprotected PC can become infected within four minutes of connecting to the internet*** īƒ˜ Cybercrime has surpassed illegal drug trafficking as a criminal moneymaker*
  • 5. The Council of Europe's Cybercrime Treaty uses the term 'cybercrime' to refer to offenses ranging from criminal activity against data to content and copyright infringement [Krone, 2005]. However, others [Zeviar-Geese, 1997-98] suggest that the definition is broader, including activities such as fraud, unauthorized access, child pornography, and cyber stalking. The United Nations Manual on the Prevention and Control of Computer Related Crime includes fraud, forgery, and unauthorized access [United Nations, 1995] in its cybercrime definition. References *“Cybercrime More Profitable Than Drugs”, NineMSN **Identity Theft Statistics, Identity Protection Online ***“Eliminating Mobile Security Blindfolds”, Tech News World ī‚— Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN 1832-3413. 2005. Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.
  • 6. Profile of Cyber Criminal īƒ˜ Disgruntled employees īƒ˜ Teenagers īƒ˜ Political Hacktivist īƒ˜ Professional Hackers īƒ˜ Business Rival īƒ˜ Ex-Boy Friend īƒ˜ Divorced Husband.etc
  • 7. VICTIMS īƒ˜ Gullible īƒ˜ Desperados and greedy people īƒ˜ Unskilled & Inexperienced īƒ˜ Unlucky people
  • 8. Computer Crimes are Vulnerable Because off :- īƒ˜Anonymity īƒ˜Computer's storage capacity īƒ˜Weakness in Operating System īƒ˜Lack off Awareness off user
  • 9. TYPES OF CYBER CRIME â€ĸ HACKING â€ĸ DENIAL OF SERVICE ATTACK â€ĸ COMPUTER VIRUS â€ĸ SOFTWARE PIRACY â€ĸ PORNOGRAPHY â€ĸ IRC Crime â€ĸ CREDIT CARD FRAUD â€ĸ SPAMMING â€ĸ PHISHING â€ĸ SPOOFING â€ĸ CYBER STALKING â€ĸ CYBER DEFAMATION â€ĸ THREATENING â€ĸ SALAMI ATTACK
  • 10. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super- user" account. This will allow both maximum access and the ability to hide your presence.
  • 11. COMPUTER VIRUS A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. The term comes from the term virus in biology. A computer virus reproduces by making, possibly modified, copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works
  • 12. SOFTWARE PIRACY īƒ˜ Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original īƒ˜ Retail revenue losses worldwide are ever increasing due to this crime īƒ˜ Can be done in various ways- End user copying,, Hard disk loading,, Counterfeiting,, Illegal downloads from the internet etc
  • 13. PORNOGRAPHY īƒ˜ Pornography is the first consistently successful ecommerce product īƒ˜ Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites īƒ˜ Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse īƒ˜ Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000.
  • 14. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other īƒ˜ Criminals use it for meeting coconspirators īƒ˜ Hackers use it for discussing their exploits / sharing the techniques īƒ˜ Pedophiles use chat rooms to allure small children īƒ˜ Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 15. CREDIT CARD FRAUD You simply have to type credit card number into www page off the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 18. How the credit card skimmer is used
  • 20. 1- ATM machine as usual ?
  • 21. 2- Is there an additional slot ?
  • 22. 3- A monitor and pamphlet holder at the side...nothing wrong
  • 23. 5-False pamphlet box affixed to the ATM cubicle side
  • 25. SPAMMING Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are generally undesired. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, internet forum spam and junk fax transmissions. Spamming is economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.
  • 26. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means In most cases, phishers send out a wave of spam email, sometimes up to millions of messages. Each email contains a message that appears to come from a well- known and trusted company. Usually the message includes the company's logo and name, and it often tries to evoke an emotional response to a false crisis. Couched in urgent, business-like language, the email often makes a request of the user’s personal information. Sometimes the email directs the recipient to a spoofed Web site. The Web site, like the email, appears authentic and in some instances its URL has been masked so the Web address looks real.
  • 27. Spoofing Getting one computer on a network to pretend to have the identity off another computer,, usually one with special access privileges ,, so as to obtain access to the other computers on the network. A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).
  • 28. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim's network or fill's his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 29. CYBER STALKING The Criminal follows the victim by sending emails, entering the chat rooms frequently.
  • 30. CYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss,, ex- boys friend against girl,, divorced husband against wife etc)
  • 31. THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss,, friend or official)
  • 32. SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 33. SALE OF NARCOTICS īƒ˜ Sale & Purchase through net īƒ˜ There are web site which offset sale and shipment off contrabands drugs īƒ˜ They may use the techniques off stenography for hiding the messages
  • 34. Now in its tenth year, the Internet Crime Complaint Center (IC3) has become a vital resource for victims of online crime and for law enforcement investigating and prosecuting offenders. In 2010, IC3 received the second-highest number of complaints since its inception. IC3 also reached a major milestone this year when it received its two-millionth complaint. On average, IC3 receives and processes 25,000 complaints per month. IC3 is more than a repository for victim complaints. It serves as a conduit for law enforcement to share information and pursue cases that often span jurisdictional boundaries. IC3 was founded in 2000 as a joint effort between the National White Collar Crime Center (NW3C)/Bureau of Justice Assistance (BJA) and the Federal Bureau of Investigation (FBI). That partnership leveraged the
  • 35. resources necessary to aid law enforcement in every aspect of an Internet fraud complaint. The most common victim complaints in 2010 were non-delivery of payment/merchandise, scams impersonating the FBI (hereafter “FBI-related scams”) and identity theft. Victims of these crimes reported losing hundreds of millions of dollars. Through a number of technological advancements, IC3 has streamlined the way it processes and refers victim complaints to law enforcement. In 2004, IC3 developed Automatch, an automated internal complaint grouping and analytical search tool. The design of Automatch is based on an assessment of the IC3 partnership aimed at defining a joint workflow for the project partners with different service requirements. IC3 IT staff continually review and update
  • 36. Automatch to meet the needs of analysts who build cases for law enforcement worldwide gathering all related information based on commonalities in the IC3 data. In 2009, NW3C developed the state-of-the-art Internet Complaint Search and Investigation System (ICSIS), which fosters seamless collaboration among law enforcement from multiple jurisdictions. Expert IC3 analysts also provide key analytical and case support. The 2010 Internet Crime Report demonstrates how pervasive online crime has become, affecting people in all demographic groups. The report provides specific details about various crimes, their victims and the perpetrators. It also shows how IC3 continually adapts its methods to meet the needs of the public and law enforcement.
  • 37. Type Percent 1. Non-delivery Payment/Merchandise 14.4% 2. FBI-Related Scams 13.2% 3. Identity Theft 9.8% 4. Computer Crimes 9.1% 5. Miscellaneous Fraud 8.6% 6. Advance Fee Fraud 7.6% 7. Spam 6.9% 8. Auction Fraud 5.9% 9. Credit Card Fraud 5.3% 10. Overpayment Fraud 5.3%
  • 38.
  • 39.
  • 40. UN RESOLUTION ī‚— A broad, inclusive focus is necessary to address problems of cybercrime, going beyond criminal law, penal procedures and law enforcement. The focus should include requirements for the secure functioning of a cyber-economy optimizing business confidence and individual privacy, as well as strategies to promote and protect the innovation and wealth-creating potential and opportunities of information and computing technologies, including early warning and response mechanisms in case of cyber attacks. Behind the prevention and prosecution of computer-related crime looms the larger challenge of creating a global culture of cyber security, addressing the needs of all societies, including developing countries, with their emerging and still vulnerable information technology structures.
  • 41. EU RESOLUTION The European Commission adopted a proposal for new laws against cybercrime to harmonies laws that deal with hacking, viruses and denial of service attacks. All EU Member States are also members of the Council of Europe which recently agreed a Cybercrime Convention with the same aim ī‚— The Commission adopted its proposal for a Council Framework Decision on "Attacks against information systems" seeks to ensure that Europe's law enforcement and judicial authorities can take action against crimes for which existing laws were not designed. It also aims to encourage and promote information security. Antonio Vitorino, European Commissioner for Justice and Home Affairs, said: "Member States' laws contain some significant gaps which could hamper the ability of law enforcement and judicial authorities to respond to crimes against information systems. Given the trans- national nature of hacking, virus and denial of service attacks, it is important that the European Union takes action in this area to ensure effective police and judicial co-operation."
  • 42. DOs or DONTs What you should not do īƒ˜ Expose yourself that you are not available in town or give your details about location and itinerary when email auto responder enabled īƒ˜ Hand over your credit card to any person īƒ˜ Auto-connect to open Wi-Fi (wireless fidelity) networks īƒ˜ Get confused, frightened or pressured into divulging information if you receive an e-mail purporting to be from your bank or credit card provider as criminal use scare tactics īƒ˜ Keep passwords stored on your computer
  • 43. īƒ˜ Open email attachment if you are not sure about it. īƒ˜ Assume a company is legitimate based on "appearance" of the website. īƒ˜ Be wary of investments that offer high returns at little or no risk. īƒ˜ Accept packages that you didn't order. īƒ˜ Go online without virus protection and a firewall in place.
  • 44. What you should do īƒ˜ Install and use a firewall, pop-up blocker and spyware detector īƒ˜ Ensure that your virus definitions are up to date and run anti-virus and spyware detectors/cleaners regularly īƒ˜ Make Backups of Important Files and Folders to protect important files and records on your computer if your computer malfunctions or is damaged by a successful attacker īƒ˜ Use strong passwords - Easy to remember and difficult to guess type password. Use alphanumeric and special characters in your password. The length of password should be as long as possible (More than 8 characters)
  • 45. ī‚— Use a variety of passwords, not same for all of your accounts ī‚— Be extremely wary of spam legitimate looking email asking for confidential information. Never ever click on the link given in the spam email. ī‚— Always delete spam emails immediately and empty the trash box to prevent accidental clicking on the same link. ī‚— Be wary of websites that require your card details up front before you actually place an order. ī‚— Not to believe everything you read online ī‚— Take your time - do not rush into things
  • 46. Reference *“Cybercrime More Profitable Than Drugs”, NineMSN **Identity Theft Statistics, Identity Protection Online ***“Eliminating Mobile Security Blindfolds”, Tech News World ī‚— Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN 1832-3413. 2005. Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.