SlideShare a Scribd company logo
CYBER CRIME
AFROZULLA KHAN Z
(ETHICAL HACKER)
CRIMINOLOGY & FORENSIC SCIENCE
This is any crime that involves
computer and a network.
HISTORY
The first recorded cyber crime took
place in 1820.
The first spam email took place in
1976 when it was sent over the
ARPANT.
The first virus was installed on an
Apple computer in 1982.
Categories of
cyber crime
The computer as a target:
Using a computer to attack other
computer.
Example: Hacking, Virus/Worms
attacks, etc.
The computer as a weapon:
Using a computer to commit real
world crime.
Example: Cyber Terrorism, Credit
Card fraud, Pornography etc.
Types of cyber crime
spam
Spam commonly refers to bulk, unsolicited,
unwanted and potentially harmful
electronic messages.
Spam is a technique preferred by
cybercriminals because of speed of
distribution & delivery to the large number
of targets which can be achieved in one go.
How does spamworks ?
Spam is usually sent by a ‘spammer’.
 Spam is rarely sent directly by a
company advertising itself.
 The cost of spam is far less than postal
bulk mailings.
 An spammer could spam 10,000
recipients for less than 6000 INR.
 To send large volumes of spam,
spammers take advantage of geographic
areas.
How do spammers collect email addresses
Sometimes spammers may buy the
addresses 15 million email addresses can
be purchased for as little as 10000 INR.
 They could obtain by using software
programs known as ‘Harvesters’
Spamemail
Spamcall
Computer Virus
Computer Virus are computer programs
that, when opened put copies of
themselves into other computers’ hard
drives without the users’ consent.
Creating a computer virus and
disseminating it is cyber-crime.
virus
How can a Computer Virus find me ?
Even if you‘re careful you can pick up
computer viruses through normal Web
activities like:
• Sharing music, files or photos with other
users.
• Visiting an infected Web site.
• Opening spam email or an email
attachment.
• Downloading free games, toolbars, media
players and other system utilities.
• Installing mainstream software
What does a Computer Virus do ?
Some computer viruses are programmed
to harm your computer by damaging
programs, deleting files, or reformatting the
hard drive.
The virus may steal disk space, access
personal information, ruin data on the
computer or send information out to the
other computer user’s personal contacts.
Symptoms of Computer Virus
Your computer may be infected if you
recognize any of these malware symptoms:
 Slow computer performance.
 Irregular computer behavior.
 Unexplained data loss,
 Frequent computer crashes.
removal of Computer Virus
 Use antivirus protection and a firewall.
 Get antispyware software.
 Always keep your antivirus protection
and antispyware software up-to-date.
 Update your operating system regularly.
 Increase your browser security settings.
 Only download software from sites you
trust.
 Don’t open mails from unknown senders.
 Immediately delete mails you suspect to
be spam.
Identity theft
It is a form of stealing someone’s personal
information and pretending to be that
person in order to obtain financial
resources or other benefits in that person’s
name without their consent.
Identity theft is considered as cybercrime.
The personal information stolen can
include the person’s name, social security
number, birth date or credit card numbers.
This stolen information is then used to
obtain new credit cards, access bank
accounts or obtain other benefits, such as
driver’s license.
Common types of identity theft
 Social Security Identity Theft.
 Financial Identity Theft.
 Driver’s License Identity Theft.
 Criminal Identity Theft.
 Medical Identity Theft.
 Tax Identity Theft.
 Child Identity Theft.
 ATM Cards.
How identity theft can be committed
Identity theft is committed by using the
victim’s browser security or through
spyware, which is software placed
unknowingly on a person’s computer in
order to obtain information.
Identity theft can also be performed by
hacking into computer networks to obtain
personal data- sometimes in large
amounts.
What do thieves do withyour information ?
 Drain your bank account.
 Run up charges on your credit cards.
 Open new utility accounts.
 Get medical treatment on your health
insurance.
 An identity thief can file a tax refund in
your name and get your refund.
 Thief may give your name to the police
during an arrest.
Clues that someone has stolen your information
 Withdrawals from bank account.
 Don’t get bills or other mail.
 New bills from the services to which you
never subscribe.
 Unfamiliar accounts or charges on credit
report.
 Rejection of credit cards or its blockage.
 Use of your accounts or login details.
Preventionof identitytheft
 Keep personal documents in safe.
 Protect your purse or wallet.
 Photocopy the contents of your wallet.
 Examine your bank account statements
monthly.
 Cancel credit cards that you’re not using.
 Use of strong passwords.
 Protect your computer.
Phishing attack
It is a form of social engineering that uses
email or malicious websites to gain
personal information from an individual or
company.
This is a technique of extracting
confidential information such as credit card
numbers and username passwords.
Process of Phishing attack
Phishing scam attempt
Phishing link
Avoid Phishing attack
 Guard against spam.
 Communicate personal information only
via phone or secure web sites.
 Do not click on links, download files or
open attachments in emails from unknown
senders.
 Never email personal or financial
information.
 Beware of links in emails that ask for
personal information.
spyware
Spyware, is a computer software
programme or hardware device that
enables an unauthorized to secretly
monitor and gather information about your
computer use.
There are many types of computer software
programmes and hardware devices that
can be installed to monitor your computer
activities.
They can be installed in your computer
without your knowledge, & doesn’t even
Spyware work
Spyware can keep track of
 Every keystroke you type.
 Every software application you use.
 Website you visit.
 Chat or Instant message you send.
 Document you open.
 Everything you print.
 It can freeze, shutdown or restart your
computer.
 It can remotely turn on webcam.
Man in the middle attack
A man-in-the-middle attack is a type of
cyber attack where a malicious actor
inserts him/herself into a conversation
between two parties, and gains access to
information that the two parties were trying
to send to each other.
A man-in-the-middle attack allows a
malicious actor to intercept, send and
receive data meant for someone else, or
not meant to be sent at all, without either
outside party knowing until it is too late
Process of mim
Man-in-the-middle attack
How to recover lost data
recuva
 Deleted a file by mistake? Recuva brings
lost files on your computer.
Recovery from damaged or formatted
disks.
 Recover deleted emails.
 Recover unsaved word documents.
 Securely delete files you want to erase
forever.
Web jacking
This term is derived from the term hi
jacking.
In these kinds of offences the hacker
gains access and control over the web site
of another.
He may even change the information on
the site.
Web jacking is simply when someone
clones your website, and tricks you to
believe the cloned site is yours.
 This is quite different from the usual
phishing methods.
What happen next ?
 Certainly, you have no access to the
website again. The brain that is behind the
jacking takes control and may decide to
demand a ransom.
 The hacker might choose to steal the
website credentials such as password,
usernames, email addresses, account
numbers, etc.
Website Web jacking
Prevention of web jacking
 Preventing web jacking might be quite
unmanageable.
 Use Abode Flash.
 Update your browser & add-ons.
 Block Scripts It’s advisable to install No
script add on if you’re using Firefox. They
provide protection against frame based attack,
by preventing scripts from loading.
sections
 Section 66C : Using password of another
person (Identity Theft), Imprisonment up to 3
years or/and with fine up to 100,000.
 Section 66D : Cheating using computer
resources, Imprisonment up to 3 years or/and
with fine up to 100,000.
 Section 66E : Publishing private images of
others, Imprisonment up to 3 years or/and with
fine up to 100,000.
 Section 384 : Web-Jacking.

suggestions
 Don't reply to spam.
 Protect your computers.
 Use Strong Password.
 Update Anti-virus software.
 Keep backup volumes of data.
 Use Virtual Keyboards for online
transactions.
 Turn-off internet when not in use.
 Update your operating system regularly.
 Clear Cookies.
 Use a pop-up advertising blocker on your
internet browser.
USB - Pratirodh
AppSamvid
M-Kavach
Browser JSGuard
unhack

More Related Content

What's hot

Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
SanishShrestha2
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber crime
Cyber crimeCyber crime
Cyber Security
Cyber SecurityCyber Security
Cyber Security
JamshidRaqi
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 

What's hot (20)

Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Similar to CYBER CRIME AWARENESS (Thematic Presentation)

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
MarlynLiagao
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
Hannah323676
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
selcukca84
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
SoniaTaryal
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
Froilan Cantillo
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similar to CYBER CRIME AWARENESS (Thematic Presentation) (20)

Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Computer security
Computer securityComputer security
Computer security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 

Recently uploaded

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 

Recently uploaded (20)

一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 

CYBER CRIME AWARENESS (Thematic Presentation)

  • 1. CYBER CRIME AFROZULLA KHAN Z (ETHICAL HACKER) CRIMINOLOGY & FORENSIC SCIENCE
  • 2. This is any crime that involves computer and a network.
  • 4. The first recorded cyber crime took place in 1820. The first spam email took place in 1976 when it was sent over the ARPANT. The first virus was installed on an Apple computer in 1982.
  • 6. The computer as a target: Using a computer to attack other computer. Example: Hacking, Virus/Worms attacks, etc. The computer as a weapon: Using a computer to commit real world crime. Example: Cyber Terrorism, Credit Card fraud, Pornography etc.
  • 9. Spam commonly refers to bulk, unsolicited, unwanted and potentially harmful electronic messages. Spam is a technique preferred by cybercriminals because of speed of distribution & delivery to the large number of targets which can be achieved in one go.
  • 10. How does spamworks ? Spam is usually sent by a ‘spammer’.  Spam is rarely sent directly by a company advertising itself.  The cost of spam is far less than postal bulk mailings.  An spammer could spam 10,000 recipients for less than 6000 INR.  To send large volumes of spam, spammers take advantage of geographic areas.
  • 11. How do spammers collect email addresses Sometimes spammers may buy the addresses 15 million email addresses can be purchased for as little as 10000 INR.  They could obtain by using software programs known as ‘Harvesters’
  • 15. Computer Virus are computer programs that, when opened put copies of themselves into other computers’ hard drives without the users’ consent. Creating a computer virus and disseminating it is cyber-crime.
  • 16. virus
  • 17. How can a Computer Virus find me ? Even if you‘re careful you can pick up computer viruses through normal Web activities like: • Sharing music, files or photos with other users. • Visiting an infected Web site. • Opening spam email or an email attachment. • Downloading free games, toolbars, media players and other system utilities. • Installing mainstream software
  • 18. What does a Computer Virus do ? Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. The virus may steal disk space, access personal information, ruin data on the computer or send information out to the other computer user’s personal contacts.
  • 19. Symptoms of Computer Virus Your computer may be infected if you recognize any of these malware symptoms:  Slow computer performance.  Irregular computer behavior.  Unexplained data loss,  Frequent computer crashes.
  • 20. removal of Computer Virus  Use antivirus protection and a firewall.  Get antispyware software.  Always keep your antivirus protection and antispyware software up-to-date.  Update your operating system regularly.  Increase your browser security settings.  Only download software from sites you trust.  Don’t open mails from unknown senders.  Immediately delete mails you suspect to be spam.
  • 22. It is a form of stealing someone’s personal information and pretending to be that person in order to obtain financial resources or other benefits in that person’s name without their consent. Identity theft is considered as cybercrime. The personal information stolen can include the person’s name, social security number, birth date or credit card numbers. This stolen information is then used to obtain new credit cards, access bank accounts or obtain other benefits, such as driver’s license.
  • 23. Common types of identity theft  Social Security Identity Theft.  Financial Identity Theft.  Driver’s License Identity Theft.  Criminal Identity Theft.  Medical Identity Theft.  Tax Identity Theft.  Child Identity Theft.  ATM Cards.
  • 24. How identity theft can be committed Identity theft is committed by using the victim’s browser security or through spyware, which is software placed unknowingly on a person’s computer in order to obtain information. Identity theft can also be performed by hacking into computer networks to obtain personal data- sometimes in large amounts.
  • 25. What do thieves do withyour information ?  Drain your bank account.  Run up charges on your credit cards.  Open new utility accounts.  Get medical treatment on your health insurance.  An identity thief can file a tax refund in your name and get your refund.  Thief may give your name to the police during an arrest.
  • 26. Clues that someone has stolen your information  Withdrawals from bank account.  Don’t get bills or other mail.  New bills from the services to which you never subscribe.  Unfamiliar accounts or charges on credit report.  Rejection of credit cards or its blockage.  Use of your accounts or login details.
  • 27. Preventionof identitytheft  Keep personal documents in safe.  Protect your purse or wallet.  Photocopy the contents of your wallet.  Examine your bank account statements monthly.  Cancel credit cards that you’re not using.  Use of strong passwords.  Protect your computer.
  • 29. It is a form of social engineering that uses email or malicious websites to gain personal information from an individual or company. This is a technique of extracting confidential information such as credit card numbers and username passwords.
  • 33. Avoid Phishing attack  Guard against spam.  Communicate personal information only via phone or secure web sites.  Do not click on links, download files or open attachments in emails from unknown senders.  Never email personal or financial information.  Beware of links in emails that ask for personal information.
  • 35. Spyware, is a computer software programme or hardware device that enables an unauthorized to secretly monitor and gather information about your computer use. There are many types of computer software programmes and hardware devices that can be installed to monitor your computer activities. They can be installed in your computer without your knowledge, & doesn’t even
  • 36. Spyware work Spyware can keep track of  Every keystroke you type.  Every software application you use.  Website you visit.  Chat or Instant message you send.  Document you open.  Everything you print.  It can freeze, shutdown or restart your computer.  It can remotely turn on webcam.
  • 37. Man in the middle attack
  • 38. A man-in-the-middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late
  • 41. How to recover lost data
  • 43.  Deleted a file by mistake? Recuva brings lost files on your computer. Recovery from damaged or formatted disks.  Recover deleted emails.  Recover unsaved word documents.  Securely delete files you want to erase forever.
  • 45. This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even change the information on the site. Web jacking is simply when someone clones your website, and tricks you to believe the cloned site is yours.  This is quite different from the usual phishing methods.
  • 46. What happen next ?  Certainly, you have no access to the website again. The brain that is behind the jacking takes control and may decide to demand a ransom.  The hacker might choose to steal the website credentials such as password, usernames, email addresses, account numbers, etc.
  • 48. Prevention of web jacking  Preventing web jacking might be quite unmanageable.  Use Abode Flash.  Update your browser & add-ons.  Block Scripts It’s advisable to install No script add on if you’re using Firefox. They provide protection against frame based attack, by preventing scripts from loading.
  • 49. sections  Section 66C : Using password of another person (Identity Theft), Imprisonment up to 3 years or/and with fine up to 100,000.  Section 66D : Cheating using computer resources, Imprisonment up to 3 years or/and with fine up to 100,000.  Section 66E : Publishing private images of others, Imprisonment up to 3 years or/and with fine up to 100,000.  Section 384 : Web-Jacking. 
  • 50. suggestions  Don't reply to spam.  Protect your computers.  Use Strong Password.  Update Anti-virus software.  Keep backup volumes of data.  Use Virtual Keyboards for online transactions.  Turn-off internet when not in use.  Update your operating system regularly.  Clear Cookies.  Use a pop-up advertising blocker on your internet browser.