SlideShare a Scribd company logo
1 of 33
CYBER CRIME AND SECURITY
If we can defeat them sitting at
home……who needs to fight with tanks
and guns!!!!
Presented By
Eng. Md.Tawhidur Rahman Pial
CCNA,CCNA-SEC,CCNP,
C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+
,Telecom+, Network+, Security+, Linux+
Consultant of Cyber Crime & Digital Forensic
Visiting Scholar , Dept of IICT , BUET
CONTENTS
 Introduction.
 Definition.
 History.
 Cyber threat evolution.
 Categories of cyber crime.
 Types of cyber crime.
 Prevention.
 Security.
 Conclusion.
INTRODUCTION
The internet in Bangladesh is growing rapidly. It has
given rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
Modern Day Crimes- Transnational crime
syndicates
What Is organized Crime?
Network of criminals working across the borders to synchronize criminal
activities such as extortion, drug trafficking, Human Trafficking,
Smuggling, cybercrime, etc.
 THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The
Odessa Mafia.
 THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).
 THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)
 THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai.
According to FBI Transnational Organized criminal Syndicates are venturing
into the world of cyber crime diverting their attention from the traditional
methods. They are hiring top class hackers from all over the globe. The
interpol suggests that the Russian Mafia are one of the pioneers of the
international Cyber crime industry. Their strength and influence has lead
to rise in terror throughout the cyber world.
Cyber crime
HISTORY
• The first recorded cyber crime took place in the
year 1820.
• The first spam email took place in 1978 when it
was sent over the Arpanet.
• The first Virus was installed on an Apple
Computer in 1982.
CYBER THREAT EVOLUTION
CATEGORIZATION OF CYBER CRIME
• The Computer as a Target
• The computer as a weapon
TYPES OF CYBER CRIME
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Technology Crime
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the
bandwidth of the victims network.
• Is his e-mail box with spam mail depriving
him of the services.
VIRUS DISSEMINATION
• Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus
Types of Cyber Vandalism
Worms- usually spread through e-mails, attaches itself and resends itself
out through your e-mail contacts. Causes files to react slowly, and works its
way through individual and network computers.
Viruses- usually spread through innocent looking links and social network
sites attaching itself to applications, videos, and hyperlinks. Very harmful to
computers, causes hard drive failure, or can contain backdoor Trojan
programs which can contain key-loggers, remote access programs, open
pornography sites on its own, and access to total control over computer.
Computer Hacking – perpetrators break into security systems in order to
use services, change information, or steal information
CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
Technology Crimes
• Technology used in crime commission other than
computers themselves- includes software
• These crimes often affect the elderly through
phone scams promising large cash prizes after
giving up personal information such as bank
account numbers, or social security numbers.
Types of Technology Crimes
Cell Phone Fraud- fraudulently or legitimately
obtained cell phones used for deceptive purposes
such as promises of fake charities or prizes
designed to illicit personal information and money
from people
Software Piracy- illegal downloads of software
from the internet
Types of Technology Crimes
Shoplifting Software
Physically stealing hardware for resale or
information
Theft of cable services
Cyber Theft
• Use of the internet in the distribution of unlawful
materials for profit or to commit fraud for swift
revenue returns
• These crimes promote child pornography, and
perpetrators swindle millions of dollars a year
from innocent people while remaining
anonymous.
Types of cyber theft
Computer Fraud- includes theft of information,
software, manipulation of bank and credit card
accounts, and corporate espionage
Unlawful distribution of pornography or drugs for profit
Illegal Copyright Infringement (Warez) – stealing
software, destroying it’s copyright information, then
posting on internet or file sharing
Internet securities fraud
Identity Theft- computer used to steal personal
information to obtain fraudulent loans, credit, or bank
account information
Cyber Warfare
• Cyber crime in which perpetrators have political
motives attached.
• These crimes may involve computer network
penetrations on military bases, defense
contractors, and aerospace companies. The goal
is to embezzle vital data and information.
Types of Cyber Warfare
Cyber Terrorism- enemies strike at targets without
bombs, such as the American economy, or use
the internet to gather information on future targets
without having to go behind enemy lines.
Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the
National Security Agency, and nuclear weapons
lab.
Can also be used to attack electric power and
essential services
TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
Recent Day Cyber Crime
 The majority of cybercrimes are centered on forgery,
fraud and Phishing,
 India is the third-most targeted country for Phishing
attacks after the US and the UK,
 Social networks as well as ecommerce sites are major
targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during
2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating
spam.
Recent Day Cyber Crime
• Looking at the scam history, some of the popular scams have
been the ‘419 scam’,
• ‘See who viewed your profile!’,
• ‘Dad walks in on daughter …. Embarrassing!’,
• ‘The ‘dislike’ button’,
• ‘Make thousands working from home!’,
• Twitter direct messages with bad links,
• ‘Twitter mentions’,
• ‘Justin Bieber stabbed!’,
• ‘Your account has been cancelled.’,
• ‘Confirm your email account’,
• ‘Facebook will start charging members!’, and the list can go
on and on.
SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Don’t open emails or attachments from unknown
sources.
• Disable Remote Connectivity.
5P mantra for
online
security
Precaution
Prevention
Protection
Preservation
Perseverance
Security
The growing phenomenon of cybercrime is
causing a whole new set of laws and law
enforcement processes.
This causes numerous challenges for law
enforcement, because technology changes
so rapidly it is hard to keep up with the
training
CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to
use against attacks over the Internet.
Application/Web
Logging DB (ms sql)
Web Console
(DB/Processing)
Agents
(Workstations/Laptops
/Servers )
Private Site Server
Private Site Server
Network Shares
(Non agent data
sources)
Public Site Server
SilentRunner
Nodes with
Proxy Agent
Computer Emergency Response Team
(CERT ) – Architecture(CERT ) – Architecture
ADVANTAGES OF CYBER
SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and
outgoing data on our computer.
CONCLUSION
Technology is destructive only in the hands
of people who do not realize that they are
one and the same process as the universe.
References
1. Foster, R.E. (2000). Police Technology.
2. Upper Saddle River: Pearson Prentice Hall
3. Siegel, L.J. (2010). Criminology: Theories,
Patterns, and Typologies. Tenth Edition.
4. Belmont: Wadsworth Cengage Learning.
CYBER CRIME AND SECURITY

More Related Content

What's hot (20)

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
cyber security
cyber securitycyber security
cyber security
 

Similar to CYBER CRIME AND SECURITY

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.pptArshad Khan
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxBigBoss647822
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfgtxgeforce67
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 

Similar to CYBER CRIME AND SECURITY (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber crime ands security.ppt
Cyber crime ands security.pptCyber crime ands security.ppt
Cyber crime ands security.ppt
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptxCYBER CRIME AND SECURITY1.pptx
CYBER CRIME AND SECURITY1.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdfcybercrimeandsecurityppt-140210064917-phpapp02.pdf
cybercrimeandsecurityppt-140210064917-phpapp02.pdf
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

CYBER CRIME AND SECURITY

  • 1. CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Eng. Md.Tawhidur Rahman Pial CCNA,CCNA-SEC,CCNP, C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+ ,Telecom+, Network+, Security+, Linux+ Consultant of Cyber Crime & Digital Forensic Visiting Scholar , Dept of IICT , BUET
  • 2. CONTENTS  Introduction.  Definition.  History.  Cyber threat evolution.  Categories of cyber crime.  Types of cyber crime.  Prevention.  Security.  Conclusion.
  • 3. INTRODUCTION The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 4. Modern Day Crimes- Transnational crime syndicates What Is organized Crime? Network of criminals working across the borders to synchronize criminal activities such as extortion, drug trafficking, Human Trafficking, Smuggling, cybercrime, etc.  THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The Odessa Mafia.  THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).  THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)  THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai. According to FBI Transnational Organized criminal Syndicates are venturing into the world of cyber crime diverting their attention from the traditional methods. They are hiring top class hackers from all over the globe. The interpol suggests that the Russian Mafia are one of the pioneers of the international Cyber crime industry. Their strength and influence has lead to rise in terror throughout the cyber world.
  • 6. HISTORY • The first recorded cyber crime took place in the year 1820. • The first spam email took place in 1978 when it was sent over the Arpanet. • The first Virus was installed on an Apple Computer in 1982.
  • 8. CATEGORIZATION OF CYBER CRIME • The Computer as a Target • The computer as a weapon
  • 9. TYPES OF CYBER CRIME • Hacking • Denial of service attack • Virus Dissemination • Computer Vandalism • Cyber Terrorism • Technology Crime
  • 10. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 11. DENIAL OF SERVICE ATTACK • Act by the criminal, who floods the bandwidth of the victims network. • Is his e-mail box with spam mail depriving him of the services.
  • 12. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 13. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 14. Types of Cyber Vandalism Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information
  • 15. CYBER TERRORISM • Use of Internet based attacks in terrorist activities. • Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
  • 16. Technology Crimes • Technology used in crime commission other than computers themselves- includes software • These crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers.
  • 17. Types of Technology Crimes Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet
  • 18. Types of Technology Crimes Shoplifting Software Physically stealing hardware for resale or information Theft of cable services
  • 19. Cyber Theft • Use of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns • These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous.
  • 20. Types of cyber theft Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information
  • 21. Cyber Warfare • Cyber crime in which perpetrators have political motives attached. • These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information.
  • 22. Types of Cyber Warfare Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services
  • 23. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 24. Recent Day Cyber Crime  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 25. Recent Day Cyber Crime • Looking at the scam history, some of the popular scams have been the ‘419 scam’, • ‘See who viewed your profile!’, • ‘Dad walks in on daughter …. Embarrassing!’, • ‘The ‘dislike’ button’, • ‘Make thousands working from home!’, • Twitter direct messages with bad links, • ‘Twitter mentions’, • ‘Justin Bieber stabbed!’, • ‘Your account has been cancelled.’, • ‘Confirm your email account’, • ‘Facebook will start charging members!’, and the list can go on and on.
  • 26. SAFETY TIPS FOR CYBER CRIME • Use antivirus software’s. • Insert firewalls. • Uninstall unnecessary software • Maintain backup. • Check security settings. • Stay anonymous - choose a genderless screen name. • Never give your full name or address to strangers. • Learn more about Internet privacy. • Don’t open emails or attachments from unknown sources. • Disable Remote Connectivity. 5P mantra for online security Precaution Prevention Protection Preservation Perseverance
  • 27. Security The growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training
  • 28. CYBER SECURITY • Internet security is a branch of computer security specifically related to the Internet. • It's objective is to establish rules and measure to use against attacks over the Internet.
  • 29. Application/Web Logging DB (ms sql) Web Console (DB/Processing) Agents (Workstations/Laptops /Servers ) Private Site Server Private Site Server Network Shares (Non agent data sources) Public Site Server SilentRunner Nodes with Proxy Agent Computer Emergency Response Team (CERT ) – Architecture(CERT ) – Architecture
  • 30. ADVANTAGES OF CYBER SECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 31. CONCLUSION Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.
  • 32. References 1. Foster, R.E. (2000). Police Technology. 2. Upper Saddle River: Pearson Prentice Hall 3. Siegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. 4. Belmont: Wadsworth Cengage Learning.