SlideShare a Scribd company logo
1 of 42
Download to read offline
Cyber Crime
                            Awareness
Presented by-

CYBER CRIME INVESTIGATION
CELL, CRIME BRANCH, CID,
MUMBAI.
Why learn about CYBER CRIME ?

Because –
  – Everybody is using COMPUTERS.
  – From white collar criminals to terrorist organizations And
    from Teenagers to Adults
  – Conventional crimes like Forgery, extortion, kidnapping
    etc. are being committed with the help of computers
  – New generation is growing up with computers
  – MOST IMPORTANT - Monetary transactions
    are moving on to the INTERNET
WHAT IS COMPUTER CRIME?



    All crimes performed or resorted to by abuse of
    electronic media or otherwise, with the purpose
    of influencing the functioning of computer or
    computer system.
                  IN SHORT


COMPUTER CRIME is any crime where –
•       Computer is a target.
•       Computer is a tool of crime
•       Computer is incidental to crime
Profile of Cyber Criminal

• Disgruntled employees.
• Teenagers.
• Political Hacktivist.
• Professional Hackers.
• Business Rival.
• Ex-Boy Friend.
• Divorced Husband. etc
VICTIMS

• Gullible
• Desperados and greedy people
• Unskilled & Inexperienced
• Unlucky people
Computer Crimes are Vulnerable

 Because of :-
 Anonymity,
 Computer’s storage capacity,
 Weakness in Operating System,
 Lack of Awareness of user.
Types of Cyber Crime
   (This is not exhaustive list of cyber crime)




• HACKING                            • PHISHING
• DENIAL OF SERVICE                  • SPOOFING
  ATTACK                             • CYBER STALKING
• VIRUS DISSEMINATION
                                     • CYBER
• SOFTWARE PIRACY                      DEFAMATION
• PORNOGRAPHY                        • THREATENING
•IRC Crime
                                     • SALAMI ATTACK
•CREDIT CARD FRAUD
•NET EXTORTION
1)   HACKING


     Hacking in simple terms means illegal
 intrusion into a computer system without the
 permission of the computer owner/user.
2)DENIAL OF SERVICE ATTACK

     This is an act by the criminal, who
  floods the bandwidth of the victim’s
  network or fills his e-mail box with
  spam mail depriving him of the
  services he is entitled to access or
  provide
3)VIRUS DISSEMINATION

• Malicious software that attaches itself to
 other software.
 (virus, worms, Trojan Horse, Time bomb,
 Logic Bomb, Rabbit and Bacterium are the
 malicious softwares)
4)SOFTWARE PIRACY
•      Theft of software through the illegal copying of
    genuine programs or the counterfeiting and
    distribution of products intended to pass for the
    original.
•        Retail revenue losses worldwide are ever
    increasing due to this crime
•        Can be done in various ways-
    End user copying, Hard disk loading, Counterfeiting,
    Illegal downloads from the internet etc.
5)PORNOGRAPHY
            • Pornography is the first consistently successful e-
                commerce product.
            •   Deceptive marketing tactics and mouse trapping
                technologies Pornography encourage customers
                to access their websites.
            • Anybody including children can log on to the
                internet and access websites with pornographic
STOP PORN
                contents with a click of a mouse.
            • Publishing, transmitting any material in electronic
                form which is lascivious or appeals to the prurient
                interest is an offence under the provisions of
                section 67 of I.T. Act -2000.
PAEDOPHILIES
        THE SLAUGHTER OF INNOCENCE
            Paedophilia, or sexual attraction to children by
            an adult, is a sickness that does not
            discriminate by race, class, or age

              The Internet Allows Pedophiles



                                         5     Disguised identities for
1. Instant access to other                     approaching children, even to
  predators worldwide;                         the point of presenting as a
                                               member of teen groups;
                                         6     Ready access to "teen chat
2. Open discussion of their sexual             rooms" to find out how and
  desires;                                     why to target as potential
  ways to lure victims;                        victims;
                                         7     Shared ideas about Means to
3. Mutual support of their adult-              identify and track down home
  child sex philosophies;                      contact information;
                                         8     Ability to build a long-term
                                               "Internet" relationship with a
4. Instant access to potential                 potential victim, prior to
  child victims worldwide;                     attempting to engage the child
                                               in physical contact.
A Profile of the Pedophile
•   They come from all walks of life.
    Some are married, some single;
    some professional, some white-
    collar; some young, some retired.

• Pedophile organizations include
    – NAMBLA (The North American Man-
      Boy Love Association) and
    – PAN (Pedophile Alert Network) in the
      Netherlands.
    – Members receive monthly magazines
      and newsletters that include
      seduction techniques and advice on
      avoiding detection and prosecution.
      Pedophiles meet each other via the
      Internet where they swap methods,
      success stories, even names,
      descriptions, and images of children.
6) IRC CRIME
     Internet Relay Chat (IRC) servers have
    chat rooms in which people from
    anywhere the world can come together
    and chat with each other
•     Criminals use       it   for   meeting     co-
    conspirators.
•     Hackers use it for discussing their
    exploits / sharing the techniques
•      Paedophiles use chat rooms to allure small
    children
•      Cyber Stalking - In order to harass a woman
    her telephone number is given to others as if she
    wants to befriend males
7)       CREDIT           CARD          FRAUD

        You simply have to type credit card
     number into www page of the vendor for
     online transaction
        If electronic transactions are not secured
     the credit card numbers can be stolen by
     the hackers who can misuse this card by
     impersonating the credit card owner
Credit card skimmer
Skimmer
How the credit card skimmer is used
Credit Card Writer
1- ATM machine as usual ?
2- Is there an additional slot ?




                                   FALSE slot Fixed to
                                   the original card
                                   slot. (Same color
                                   and sticker ).
                                   Contains additional
                                   card reader to copy
                                   your card
                                   information ..and
                                   duplicate your card
3- A monitor and pamphlet holder at the side...nothing wrong
5-False pamphlet box affixed to the ATM cubicle side




                                       The micro camera at
                                       the side can view the
                                       KEYPAD and also the
                                       monitor     to    send
                                       wireless picture up to
                                       200metres.
6-Inside the “pamphlet box”
                              Camera positioned at
                              correct angle to view
                              keypad and monitor



                              Camera Battery;

                              Transmission Antenna
8) NET EXTORTION


• Copying the company’s confidential data
 in order to extort said company for huge
 amount.
9) PHISHING


   It is technique of pulling out
 confidential information from the
 bank/financial       institutional
 account holders by deceptive
 means
Actual login page
Phishing email
From: *****Bank [mailto:support@****Bank.com]
           Sent: 08 June 2004 03:25
                     To: India
  Subject: Official information from ***** Bank
       Dear valued ***** Bank Customer!

              For security purposes your account has been
    randomly chosen for verification. To verify
  your account information we are asking you to
  provide us with all the data we are requesting.
  Otherwise we will not be able to verify your identity
   and access to your account will be denied. Please click
   on the link below to get to the bank secure
   page and verify your account details. Thank you.
    https://infinity.*****bank.co.in/Verify.jsp
              ****** Bank Limited
Deceptive login page
Actual web page
10) Spoofing

• Getting one computer on a network to
 pretend to have the identity of another
 computer, usually one with special access
 privileges , so as to obtain access to the
 other computers on the network.
11) CYBER STALKING

    The Criminal follows the victim by
 sending emails, entering the chat rooms
 frequently.
12) CYBER DEFAMATION

    The Criminal sends emails containing
 defamatory matters to all concerned of
 the victim or post the defamatory matters
 on a website.
(disgruntled employee may do this against
boss, ex-boys friend against girl, divorced
husband against wife etc)
13) THREATENING

     The Criminal sends threatening email
 or comes in contact in chat rooms with
 victim.
(Any one disgruntled may do this against
 boss, friend or official)
14) SALAMI ATTACK
     In such crime criminal makes insignificant
 changes in such a manner that such changes
 would go unnoticed.
    Criminal makes such program that deducts
 small amount like Rs. 2.50 per month from the
 account of all the customer of the Bank and
 deposit the same in his account. In this case no
 account holder will approach the bank for such
 small amount but criminal gains huge amount.
15) SALE OF NARCOTICS

• Sale & Purchase through net.
• There are web site which offer sale and
  shipment of contrabands drugs.
• They may use the techniques of
  stegnography for hiding the messages.
Nigerian 4-1-9 Scam
    • This scam starts with a bulk
        mailing or bulk faxing of a
        bunch of identical letters to
        businessmen, professionals,
        and other persons who tend to
        be of greater-than-average
        wealth.
    •   This scam is often referred to as
        the
        4-1-9 scam, ironically after
        section 4-1-9 of the Nigerian
        Penal Code which relates to
        fraudulent schemes.
    • Scam is, according to
Anatomy of Nigerian Letter
                 • My father left me $40 million in his
                 will, but I have to bribe government
                 officials to get it out

                 • The Nigerian National Petroleum
                 Company has discovered oil, and we
                 as officials of that company want to
                 insider acquire the land, but we
                 need an Indian front man to
                 purchase it first for us

                 • We just sold a bunch of crude oil in
                 Nigeria, but we have to bribe the
                 banker to get it out

                 • The Nigerian government overpaid
                 on some contract, and they need a
                 front man to get it out of the country
                 before the government discovers its
                 error
ANY QUESTIONS ?????


PLEASE ASK




                     OR
Address :- Cyber Crime Investigation Cell, Crime Branch, CID,
           Compound of Office of the Commissioner of the
           Police, opp to Crawford Market, DN Road, Mumbai

                   :- officer@cybercellmumbai.com

           Web site :- www.cybercellmumbai.com

    :-              D.C.P. (preventive)           : 22612090
                    A.C.P. (Cybercell)            : 22620111
                     Cyber Crime Investigation Cell : 22630829

More Related Content

What's hot

Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaMohammed Mahfouz Alhassan
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 

Similar to SEO2India - Cyber crime

Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Jay Visavadiya
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 

Similar to SEO2India - Cyber crime (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 

More from SEO2India - Devang Barot - SEO2India

More from SEO2India - Devang Barot - SEO2India (20)

Seo2 india tax-pay-2013-14-tenament no-06161912360001n
Seo2 india tax-pay-2013-14-tenament no-06161912360001nSeo2 india tax-pay-2013-14-tenament no-06161912360001n
Seo2 india tax-pay-2013-14-tenament no-06161912360001n
 
Seo2 india - An India Based SEO Devang Barot
Seo2 india - An India Based SEO Devang BarotSeo2 india - An India Based SEO Devang Barot
Seo2 india - An India Based SEO Devang Barot
 
Seo training-seo2 india-devang barot
Seo training-seo2 india-devang barotSeo training-seo2 india-devang barot
Seo training-seo2 india-devang barot
 
Top10 freepressreleasewebsites seo2india-Devang Barot
Top10 freepressreleasewebsites seo2india-Devang BarotTop10 freepressreleasewebsites seo2india-Devang Barot
Top10 freepressreleasewebsites seo2india-Devang Barot
 
Seo2india devang barot-mumbai-dabbawala
Seo2india devang barot-mumbai-dabbawalaSeo2india devang barot-mumbai-dabbawala
Seo2india devang barot-mumbai-dabbawala
 
Mumbai dabbawala-seo2india-devang-barot
Mumbai dabbawala-seo2india-devang-barotMumbai dabbawala-seo2india-devang-barot
Mumbai dabbawala-seo2india-devang-barot
 
Seo2india the social semantic web
Seo2india the social semantic webSeo2india the social semantic web
Seo2india the social semantic web
 
Seo2India socialmediamarketing
Seo2India socialmediamarketingSeo2India socialmediamarketing
Seo2India socialmediamarketing
 
SEO2India -Websitemagazine
SEO2India -WebsitemagazineSEO2India -Websitemagazine
SEO2India -Websitemagazine
 
Seo2 India What Google Do
Seo2 India What Google DoSeo2 India What Google Do
Seo2 India What Google Do
 
Seo2 India Growing Adwords En
Seo2 India  Growing Adwords EnSeo2 India  Growing Adwords En
Seo2 India Growing Adwords En
 
SEO2India-Devang Barot- build-profitable_websites_fast
SEO2India-Devang Barot- build-profitable_websites_fastSEO2India-Devang Barot- build-profitable_websites_fast
SEO2India-Devang Barot- build-profitable_websites_fast
 
Devang seoindia barotseo_expert_india_ahmedabad_india
Devang seoindia barotseo_expert_india_ahmedabad_indiaDevang seoindia barotseo_expert_india_ahmedabad_india
Devang seoindia barotseo_expert_india_ahmedabad_india
 
Seo2 india delhi-2010-commonwelth
Seo2 india  delhi-2010-commonwelthSeo2 india  delhi-2010-commonwelth
Seo2 india delhi-2010-commonwelth
 
Seo2 india bharat nirman
Seo2 india  bharat nirmanSeo2 india  bharat nirman
Seo2 india bharat nirman
 
Seo2 india devang barot - google public dns
Seo2 india   devang barot - google public dnsSeo2 india   devang barot - google public dns
Seo2 india devang barot - google public dns
 
Pan Card Application Form - SEO2India
Pan Card Application Form - SEO2IndiaPan Card Application Form - SEO2India
Pan Card Application Form - SEO2India
 
SEO2India Ganesh
SEO2India GaneshSEO2India Ganesh
SEO2India Ganesh
 
Shakti
ShaktiShakti
Shakti
 
Indian
IndianIndian
Indian
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

SEO2India - Cyber crime

  • 1.
  • 2. Cyber Crime Awareness Presented by- CYBER CRIME INVESTIGATION CELL, CRIME BRANCH, CID, MUMBAI.
  • 3. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS. – From white collar criminals to terrorist organizations And from Teenagers to Adults – Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers – New generation is growing up with computers – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  • 4. WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. IN SHORT COMPUTER CRIME is any crime where – • Computer is a target. • Computer is a tool of crime • Computer is incidental to crime
  • 5. Profile of Cyber Criminal • Disgruntled employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend. • Divorced Husband. etc
  • 6. VICTIMS • Gullible • Desperados and greedy people • Unskilled & Inexperienced • Unlucky people
  • 7. Computer Crimes are Vulnerable Because of :- Anonymity, Computer’s storage capacity, Weakness in Operating System, Lack of Awareness of user.
  • 8. Types of Cyber Crime (This is not exhaustive list of cyber crime) • HACKING • PHISHING • DENIAL OF SERVICE • SPOOFING ATTACK • CYBER STALKING • VIRUS DISSEMINATION • CYBER • SOFTWARE PIRACY DEFAMATION • PORNOGRAPHY • THREATENING •IRC Crime • SALAMI ATTACK •CREDIT CARD FRAUD •NET EXTORTION
  • 9. 1) HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 10. 2)DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 11. 3)VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  • 12. 4)SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. • Retail revenue losses worldwide are ever increasing due to this crime • Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 13. 5)PORNOGRAPHY • Pornography is the first consistently successful e- commerce product. • Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. • Anybody including children can log on to the internet and access websites with pornographic STOP PORN contents with a click of a mouse. • Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000.
  • 14. PAEDOPHILIES THE SLAUGHTER OF INNOCENCE Paedophilia, or sexual attraction to children by an adult, is a sickness that does not discriminate by race, class, or age The Internet Allows Pedophiles 5 Disguised identities for 1. Instant access to other approaching children, even to predators worldwide; the point of presenting as a member of teen groups; 6 Ready access to "teen chat 2. Open discussion of their sexual rooms" to find out how and desires; why to target as potential ways to lure victims; victims; 7 Shared ideas about Means to 3. Mutual support of their adult- identify and track down home child sex philosophies; contact information; 8 Ability to build a long-term "Internet" relationship with a 4. Instant access to potential potential victim, prior to child victims worldwide; attempting to engage the child in physical contact.
  • 15. A Profile of the Pedophile • They come from all walks of life. Some are married, some single; some professional, some white- collar; some young, some retired. • Pedophile organizations include – NAMBLA (The North American Man- Boy Love Association) and – PAN (Pedophile Alert Network) in the Netherlands. – Members receive monthly magazines and newsletters that include seduction techniques and advice on avoiding detection and prosecution. Pedophiles meet each other via the Internet where they swap methods, success stories, even names, descriptions, and images of children.
  • 16. 6) IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other • Criminals use it for meeting co- conspirators. • Hackers use it for discussing their exploits / sharing the techniques • Paedophiles use chat rooms to allure small children • Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 17. 7) CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 20. How the credit card skimmer is used
  • 22. 1- ATM machine as usual ?
  • 23. 2- Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card
  • 24. 3- A monitor and pamphlet holder at the side...nothing wrong
  • 25. 5-False pamphlet box affixed to the ATM cubicle side The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
  • 26. 6-Inside the “pamphlet box” Camera positioned at correct angle to view keypad and monitor Camera Battery; Transmission Antenna
  • 27. 8) NET EXTORTION • Copying the company’s confidential data in order to extort said company for huge amount.
  • 28. 9) PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
  • 30. Phishing email From: *****Bank [mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. https://infinity.*****bank.co.in/Verify.jsp ****** Bank Limited
  • 33. 10) Spoofing • Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges , so as to obtain access to the other computers on the network.
  • 34. 11) CYBER STALKING The Criminal follows the victim by sending emails, entering the chat rooms frequently.
  • 35. 12) CYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)
  • 36. 13) THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss, friend or official)
  • 37. 14) SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 38. 15) SALE OF NARCOTICS • Sale & Purchase through net. • There are web site which offer sale and shipment of contrabands drugs. • They may use the techniques of stegnography for hiding the messages.
  • 39. Nigerian 4-1-9 Scam • This scam starts with a bulk mailing or bulk faxing of a bunch of identical letters to businessmen, professionals, and other persons who tend to be of greater-than-average wealth. • This scam is often referred to as the 4-1-9 scam, ironically after section 4-1-9 of the Nigerian Penal Code which relates to fraudulent schemes. • Scam is, according to
  • 40. Anatomy of Nigerian Letter • My father left me $40 million in his will, but I have to bribe government officials to get it out • The Nigerian National Petroleum Company has discovered oil, and we as officials of that company want to insider acquire the land, but we need an Indian front man to purchase it first for us • We just sold a bunch of crude oil in Nigeria, but we have to bribe the banker to get it out • The Nigerian government overpaid on some contract, and they need a front man to get it out of the country before the government discovers its error
  • 42. Address :- Cyber Crime Investigation Cell, Crime Branch, CID, Compound of Office of the Commissioner of the Police, opp to Crawford Market, DN Road, Mumbai :- officer@cybercellmumbai.com Web site :- www.cybercellmumbai.com :- D.C.P. (preventive) : 22612090 A.C.P. (Cybercell) : 22620111 Cyber Crime Investigation Cell : 22630829