CYBER CRIME AND SECURITY
If we can defeat them sitting at
home……who needs to fight with tanks
and guns!!!!
Presented By
Eng. Md.Tawhidur Rahman Pial
CCNA,CCNA-SEC,CCNP,
C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+
,Telecom+, Network+, Security+, Linux+
Consultant of Cyber Crime & Digital Forensic
Visiting Scholar , Dept of IICT , BUET
CONTENTS
 Introduction.
 Definition.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 Security.
 Conclusion.
INTRODUCTION
The internet in Bangladesh is growing rapidly. It has
given rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
Modern Day Crimes- Transnational crime
syndicates
What Is organized Crime?
Network of criminals working across the borders to synchronize criminal
activities such as extortion, drug trafficking, Human Trafficking,
Smuggling, cybercrime, etc.
 THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The
Odessa Mafia.
 THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).
 THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)
 THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai.
According to FBI Transnational Organized criminal Syndicates are venturing
into the world of cyber crime diverting their attention from the traditional
methods. They are hiring top class hackers from all over the globe. The
interpol suggests that the Russian Mafia are one of the pioneers of the
international Cyber crime industry. Their strength and influence has lead
to rise in terror throughout the cyber world.
Cyber crime
HISTORY
• The first recorded cyber crime took place in the
year 1820.
• The first spam email took place in 1978 when it
was sent over the Arpanet.
• The first Virus was installed on an Apple
Computer in 1982.
CYBER THREAT EVOLUTION
CATEGORIZATION OF CYBER CRIME
• The Computer as a Target
• The computer as a weapon
TYPES OF CYBER CRIME
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Technology Crime
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the
bandwidth of the victims network.
• Is his e-mail box with spam mail depriving
him of the services.
VIRUS DISSEMINATION
• Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
Types of Cyber Vandalism
Worms- usually spread through e-mails, attaches itself and resends itself
out through your e-mail contacts. Causes files to react slowly, and works its
way through individual and network computers.
Viruses- usually spread through innocent looking links and social network
sites attaching itself to applications, videos, and hyperlinks. Very harmful to
computers, causes hard drive failure, or can contain backdoor Trojan
programs which can contain key-loggers, remote access programs, open
pornography sites on its own, and access to total control over computer.
Computer Hacking – perpetrators break into security systems in order to
use services, change information, or steal information
CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Technology Crimes
• Technology used in crime commission other than
computers themselves- includes software
• These crimes often affect the elderly through
phone scams promising large cash prizes after
giving up personal information such as bank
account numbers, or social security numbers.
Types of Technology Crimes
Cell Phone Fraud- fraudulently or legitimately
obtained cell phones used for deceptive purposes
such as promises of fake charities or prizes
designed to illicit personal information and money
from people
Software Piracy- illegal downloads of software
from the internet
Types of Technology Crimes
Shoplifting Software
Physically stealing hardware for resale or
information
Theft of cable services
Cyber Theft
• Use of the internet in the distribution of unlawful
materials for profit or to commit fraud for swift
revenue returns
• These crimes promote child pornography, and
perpetrators swindle millions of dollars a year
from innocent people while remaining
anonymous.
Types of cyber theft
Computer Fraud- includes theft of information,
software, manipulation of bank and credit card
accounts, and corporate espionage
Unlawful distribution of pornography or drugs for profit
Illegal Copyright Infringement (Warez) – stealing
software, destroying it’s copyright information, then
posting on internet or file sharing
Internet securities fraud
Identity Theft- computer used to steal personal
information to obtain fraudulent loans, credit, or bank
account information
Cyber Warfare
• Cyber crime in which perpetrators have political
motives attached.
• These crimes may involve computer network
penetrations on military bases, defense
contractors, and aerospace companies. The goal
is to embezzle vital data and information.
Types of Cyber Warfare
Cyber Terrorism- enemies strike at targets without
bombs, such as the American economy, or use
the internet to gather information on future targets
without having to go behind enemy lines.
Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the
National Security Agency, and nuclear weapons
lab.
Can also be used to attack electric power and
essential services
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
Recent Day Cyber Crime
 The majority of cybercrimes are centered on forgery,
fraud and Phishing,
 India is the third-most targeted country for Phishing
attacks after the US and the UK,
 Social networks as well as ecommerce sites are major
targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during
2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating
spam.
Recent Day Cyber Crime
• Looking at the scam history, some of the popular scams have
been the ‘419 scam’,
• ‘See who viewed your profile!’,
• ‘Dad walks in on daughter …. Embarrassing!’,
• ‘The ‘dislike’ button’,
• ‘Make thousands working from home!’,
• Twitter direct messages with bad links,
• ‘Twitter mentions’,
• ‘Justin Bieber stabbed!’,
• ‘Your account has been cancelled.’,
• ‘Confirm your email account’,
• ‘Facebook will start charging members!’, and the list can go
on and on.
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Don’t open emails or attachments from unknown
sources.
• Disable Remote Connectivity.
5P mantra for
online
security
Precaution
Prevention
Protection
Preservation
Perseverance
Security
The growing phenomenon of cybercrime is
causing a whole new set of laws and law
enforcement processes.
This causes numerous challenges for law
enforcement, because technology changes
so rapidly it is hard to keep up with the
training
CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to
use against attacks over the Internet.
Application/Web
Logging DB (ms sql)
Web Console
(DB/Processing)
Agents
(Workstations/Laptops
/Servers )
Private Site Server
Private Site Server
Network Shares
(Non agent data
sources)
Public Site Server
SilentRunner
Nodes with
Proxy Agent
Computer Emergency Response Team
(CERT ) – Architecture(CERT ) – Architecture
ADVANTAGES OF CYBER
SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and
outgoing data on our computer.
CONCLUSION
Technology is destructive only in the hands
of people who do not realize that they are
one and the same process as the universe.
References
1. Foster, R.E. (2000). Police Technology.
2. Upper Saddle River: Pearson Prentice Hall
3. Siegel, L.J. (2010). Criminology: Theories,
Patterns, and Typologies. Tenth Edition.
4. Belmont: Wadsworth Cengage Learning.
CYBER CRIME AND SECURITY

CYBER CRIME AND SECURITY

  • 1.
    CYBER CRIME ANDSECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Eng. Md.Tawhidur Rahman Pial CCNA,CCNA-SEC,CCNP, C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+ ,Telecom+, Network+, Security+, Linux+ Consultant of Cyber Crime & Digital Forensic Visiting Scholar , Dept of IICT , BUET
  • 2.
    CONTENTS  Introduction.  Definition. History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  Security.  Conclusion.
  • 3.
    INTRODUCTION The internet inBangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4.
    Modern Day Crimes-Transnational crime syndicates What Is organized Crime? Network of criminals working across the borders to synchronize criminal activities such as extortion, drug trafficking, Human Trafficking, Smuggling, cybercrime, etc.  THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The Odessa Mafia.  THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).  THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)  THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai. According to FBI Transnational Organized criminal Syndicates are venturing into the world of cyber crime diverting their attention from the traditional methods. They are hiring top class hackers from all over the globe. The interpol suggests that the Russian Mafia are one of the pioneers of the international Cyber crime industry. Their strength and influence has lead to rise in terror throughout the cyber world.
  • 5.
  • 6.
    HISTORY • The firstrecorded cyber crime took place in the year 1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first Virus was installed on an Apple Computer in 1982.
  • 7.
  • 8.
    CATEGORIZATION OF CYBERCRIME • The Computer as a Target • The computer as a weapon
  • 9.
    TYPES OF CYBERCRIME • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Technology Crime
  • 10.
    HACKING • Hacking insimple terms means an illegal intrusion into a computer system and/or network.
  • 11.
    DENIAL OF SERVICEATTACK • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  • 12.
    VIRUS DISSEMINATION • Malicioussoftware that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13.
    COMPUTER VANDALISM • Damagingor destroying data rather than stealing. • Transmitting virus
  • 14.
    Types of CyberVandalism Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information
  • 15.
    CYBER TERRORISM • Useof Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 16.
    Technology Crimes • Technologyused in crime commission other than computers themselves- includes software • These crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers.
  • 17.
    Types of TechnologyCrimes Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet
  • 18.
    Types of TechnologyCrimes Shoplifting Software Physically stealing hardware for resale or information Theft of cable services
  • 19.
    Cyber Theft • Useof the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns • These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous.
  • 20.
    Types of cybertheft Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information
  • 21.
    Cyber Warfare • Cybercrime in which perpetrators have political motives attached. • These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information.
  • 22.
    Types of CyberWarfare Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services
  • 23.
    TYPES OF CYBERATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 24.
    Recent Day CyberCrime  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 25.
    Recent Day CyberCrime • Looking at the scam history, some of the popular scams have been the ‘419 scam’, • ‘See who viewed your profile!’, • ‘Dad walks in on daughter …. Embarrassing!’, • ‘The ‘dislike’ button’, • ‘Make thousands working from home!’, • Twitter direct messages with bad links, • ‘Twitter mentions’, • ‘Justin Bieber stabbed!’, • ‘Your account has been cancelled.’, • ‘Confirm your email account’, • ‘Facebook will start charging members!’, and the list can go on and on.
  • 26.
    SAFETY TIPS FORCYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy. • Don’t open emails or attachments from unknown sources. • Disable Remote Connectivity. 5P mantra for online security Precaution Prevention Protection Preservation Perseverance
  • 27.
    Security The growing phenomenonof cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training
  • 28.
    CYBER SECURITY • Internetsecurity is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 29.
    Application/Web Logging DB (mssql) Web Console (DB/Processing) Agents (Workstations/Laptops /Servers ) Private Site Server Private Site Server Network Shares (Non agent data sources) Public Site Server SilentRunner Nodes with Proxy Agent Computer Emergency Response Team (CERT ) – Architecture(CERT ) – Architecture
  • 30.
    ADVANTAGES OF CYBER SECURITY •Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 31.
    CONCLUSION Technology is destructiveonly in the hands of people who do not realize that they are one and the same process as the universe.
  • 32.
    References 1. Foster, R.E.(2000). Police Technology. 2. Upper Saddle River: Pearson Prentice Hall 3. Siegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. 4. Belmont: Wadsworth Cengage Learning.