SlideShare a Scribd company logo
SEMINAR
ON
CYBER CRIME
TECHNOLOGY
Submitted by
Rahul js
S5 chm
Rollno:32
Gptc ndd
Introduction
Definition
Categories of cyber crime
Defining Cyber Crime
It’s an unlawful act wherein the computer is
either a tool or a target or both.
Acts that are punishable by the Information
Technology Act.
Cyber space is a virtual space that has become
as important as real space for business, politics,
and communities .
INTRODUCTION
The internet is growing rapidly. It has given rise
to new opportunities in every field we can think
of – be it entertainment, business, sports or
education.
There are two sides to a coin. Internet also has its
own disadvantages. One of the major
disadvantages is Cyber crime – illegal activity
committed on the internet.
CATEGORIES OF CYBER
CRIME:
Cyber crimes can be basically divided
into 3 major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
SECOND CATEGORY
These crimes include computer vandalism
(destruction of others' property), transmission
of harmful programs, unauthorized trespassing
through cyber space, unauthorized possession
of computer information.
THIRD CATEGORY
Cyber terrorism is one distinct kind of crime in
this category.
The growth of internet has shown that the
medium of Cyberspace is being used by
individuals and groups to threaten the
international governments as also to terrorize
the citizens of a country.
FIRST CATEGORY
Cyber harassment is a distinct Cyber
crime. Various kinds of harassment can
and do occur in cyberspace, or through
the use of cyberspace. Harassment can be
racial, religious, or other.
Types Of Cyber Crime
Modification of a
conventional crime
by using computers.
Frequently Used
Cyber Crimes..
Modification of a conventional
crime by using computers.
Financial crimes
Sale of illegal articles
Online gambling
BACK
Frequently Used Cyber
Crimes.
Unauthorized access to computer systems or
networks
Theft of information contained in electronic
form
Denial of Service attack
BACK
CYBER CRIME
TECHNOLOGY
 BOTNET TECHNOLOGY
 PHISHING TECHNOLOGY
BOTNET
OUTLINE
Introduction to Botnet
 Botnet Life-cycle
Botnet Detection
 Preventing Botnet Infection
Conclusion
INTRODUCTION
 A Botnet is a network of compromised
computers underthe control of a remote
attacker
 controllerof a botnet is able to direct the
activities of these compromised computers
 Botnet Terminology
 Bot Herder(Bot Master)
 Bot
 Bot Client
 IRC Server
 Command and Control Channel (C&C)
INTRODUCTION
 A Botnet is a network of compromised
computers underthe control of a remote
attacker
 controllerof a botnet is able to direct the
activities of these compromised computers
 Botnet Terminology
 Bot Herder(Bot Master)
 Bot
 Bot Client
 IRC Server
 Command and Control Channel (C&C)
INTRODUCTION TO BOTNET(TERMINOLOGY)
IRC Channel
IRC Server
Code Server
IRC Channel
C&C Traffic
Updates
Victi
m
Attack
Bot Master
BOTNET LIFE-CYCLE
BOTNET LIFE-CYCLE
BOTNET LIFE-CYCLE
BOTNET LIFE-CYCLE
BOTNET DETECTION:TRAFFIC
MONITORING
 Signature based: Detection of known botnets
 Anomaly based: Detect botnet using
following anomalies
 High network latency
 High volume of traffic
 Traffic on unusual port
 Unusual system behaviour
 DNS based: Analysis of DNS traffic
generated by botnets
PREVENTING BOTNET
INFECTIONS
Use a Firewall
 Use Antivirus (AV) software
 Deploy an Intrusion Prevention System (IPS)
 Define a Security Policy and
 Share Policies with yourusers systematically
CONCLUSION
 Botnets pose a significant and growing threat
against cybersecurity
 It provides key platform formany cybercrimes
(DDOS)
 As network security has become integral part of
ourlife and botnets have become the most
serious threat to it
 It is very important to detect botnet attack and
find the solution forit
Phishing
Phishing is a way of fraudulently acquiring sensitive
information using social engineering and technical
subterfuge.
It tries to trick users with official-looking messages
Credit card
Bank account
eBay
Paypal
Some phishing e-mails also
contain malicious or unwanted
software that can track your
activities or slow your computer
The purpose of a phishing message is to acquire sensitive
information about a user. For doing so the message needs
to deceive the intended recipient.
So it doesn’t contains any useful information and hence
falls under the category of spam.
A spam message tries to sell a product or service, whereas
phishing message needs to look like it is from a legitimate
organization.
Techniques applied to spam message cant be applied
naively to phishing messages.
HOW TO PREVENT
1) Detect and block the phishing Web sites in
time
2) Enhance the security of the web sites
3) Block the phishing e-mails by various
spam filters
4) Install online anti-phishing software in
user’s computers
How to avoid Phishing
DON’T CLICK THE LINK
Type the site name in your browser (such as
www.paypal.com)
Never send sensitive account information by e-
mail
Account numbers, SSN, passwords
Never give any password out to anyone
Verify any person who contacts you (phone or
email).
If someone calls you on a sensitive topic, thank them,
hang up and call them back using a number that you
know is correct, like from your credit card or statement.
cyber crime technology

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Nishi Agrawal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Harendra Singh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
JoyBhowmik4
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
Bill Gibbs
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Muhammad Irfan
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Asish Verma
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime.ppt
Cyber crime.pptCyber crime.ppt
Cyber crime.ppt
SushmithaR26
 
cyber crime
cyber crimecyber crime
cyber crime
Nauman Ali
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime.ppt
Cyber crime.pptCyber crime.ppt
Cyber crime.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 

Viewers also liked

Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of Cyberspace
Amnon Carmel
 
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
FACE
 
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting  Spam Zombies  by  Monitoring  Outgoing  MessagesDetecting  Spam Zombies  by  Monitoring  Outgoing  Messages
Detecting Spam Zombies by Monitoring Outgoing Messages
Gowtham Chandra
 
spamzombieppt
spamzombiepptspamzombieppt
spamzombieppt
kajol agarwal
 
Social Media Fraud Metrics
Social Media Fraud MetricsSocial Media Fraud Metrics
Social Media Fraud Metrics
Antigoni-Maria Founta
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
Cyber Security Infotech
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
wajug
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Technology Trends Changing Business - #IGC13
Technology Trends Changing Business - #IGC13Technology Trends Changing Business - #IGC13
Technology Trends Changing Business - #IGC13
Kyle Lacy
 
Future of Online Communication
Future of Online CommunicationFuture of Online Communication
Future of Online Communication
Kyle Lacy
 
Media Technology and Society - Cyber Society
Media Technology and Society - Cyber SocietyMedia Technology and Society - Cyber Society
Media Technology and Society - Cyber Society
Faindra Jabbar
 
Coalition politics is mother of all corruption.
Coalition politics is mother of all corruption.Coalition politics is mother of all corruption.
Coalition politics is mother of all corruption.
DARSHAN SABALPARA
 
Chapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollution
Chapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollutionChapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollution
Chapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollution
j3di79
 
New Demand Patterns - How customers are changing the landscape of communicati...
New Demand Patterns - How customers are changing the landscape of communicati...New Demand Patterns - How customers are changing the landscape of communicati...
New Demand Patterns - How customers are changing the landscape of communicati...
Helge Tennø
 
Cyber security
Cyber securityCyber security
Cyber security
Ankush Verma
 
Environment, Pollution and Business - A great Trade Off
Environment, Pollution and Business - A great Trade OffEnvironment, Pollution and Business - A great Trade Off
Environment, Pollution and Business - A great Trade Off
10021980
 
19 Tips That Will Make You a Networking Master
19 Tips That Will Make You a Networking Master19 Tips That Will Make You a Networking Master
19 Tips That Will Make You a Networking Master
The Muse
 
Electrical Engineering
Electrical EngineeringElectrical Engineering
Electrical Engineering
MeatloafSliders
 
Environment Protection Act , 1986.
Environment Protection Act , 1986.Environment Protection Act , 1986.
Environment Protection Act , 1986.
Yuvraj Tomar
 
How technology and business is changing communication
How technology and business is changing communicationHow technology and business is changing communication
How technology and business is changing communication
Helge Tennø
 

Viewers also liked (20)

Philosophy Of Cyberspace
Philosophy Of CyberspacePhilosophy Of Cyberspace
Philosophy Of Cyberspace
 
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
 
Detecting Spam Zombies by Monitoring Outgoing Messages
Detecting  Spam Zombies  by  Monitoring  Outgoing  MessagesDetecting  Spam Zombies  by  Monitoring  Outgoing  Messages
Detecting Spam Zombies by Monitoring Outgoing Messages
 
spamzombieppt
spamzombiepptspamzombieppt
spamzombieppt
 
Social Media Fraud Metrics
Social Media Fraud MetricsSocial Media Fraud Metrics
Social Media Fraud Metrics
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Technology Trends Changing Business - #IGC13
Technology Trends Changing Business - #IGC13Technology Trends Changing Business - #IGC13
Technology Trends Changing Business - #IGC13
 
Future of Online Communication
Future of Online CommunicationFuture of Online Communication
Future of Online Communication
 
Media Technology and Society - Cyber Society
Media Technology and Society - Cyber SocietyMedia Technology and Society - Cyber Society
Media Technology and Society - Cyber Society
 
Coalition politics is mother of all corruption.
Coalition politics is mother of all corruption.Coalition politics is mother of all corruption.
Coalition politics is mother of all corruption.
 
Chapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollution
Chapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollutionChapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollution
Chapter 22 Our Impact on the Ecosystem Lesson 2 - Air pollution
 
New Demand Patterns - How customers are changing the landscape of communicati...
New Demand Patterns - How customers are changing the landscape of communicati...New Demand Patterns - How customers are changing the landscape of communicati...
New Demand Patterns - How customers are changing the landscape of communicati...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Environment, Pollution and Business - A great Trade Off
Environment, Pollution and Business - A great Trade OffEnvironment, Pollution and Business - A great Trade Off
Environment, Pollution and Business - A great Trade Off
 
19 Tips That Will Make You a Networking Master
19 Tips That Will Make You a Networking Master19 Tips That Will Make You a Networking Master
19 Tips That Will Make You a Networking Master
 
Electrical Engineering
Electrical EngineeringElectrical Engineering
Electrical Engineering
 
Environment Protection Act , 1986.
Environment Protection Act , 1986.Environment Protection Act , 1986.
Environment Protection Act , 1986.
 
How technology and business is changing communication
How technology and business is changing communicationHow technology and business is changing communication
How technology and business is changing communication
 

Similar to cyber crime technology

Cyber crime
Cyber crimeCyber crime
Cyber crime
MrunalBakshi
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Sanket Gogoi
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
akshayathetopper
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
ssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
VivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
Praveen362297
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
SOURAV CHANDRA
 
Unit 1
Unit 1Unit 1
Unit 1
Jigarthacker
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
Ronson Calvin Fernandes
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
AVISHITYAGI
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 

Similar to cyber crime technology (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Recently uploaded

LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 

cyber crime technology

  • 3. Defining Cyber Crime It’s an unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act. Cyber space is a virtual space that has become as important as real space for business, politics, and communities .
  • 4. INTRODUCTION The internet is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 5. CATEGORIES OF CYBER CRIME: Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
  • 6. SECOND CATEGORY These crimes include computer vandalism (destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.
  • 7. THIRD CATEGORY Cyber terrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  • 8. FIRST CATEGORY Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be racial, religious, or other.
  • 9. Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes..
  • 10. Modification of a conventional crime by using computers. Financial crimes Sale of illegal articles Online gambling BACK
  • 11. Frequently Used Cyber Crimes. Unauthorized access to computer systems or networks Theft of information contained in electronic form Denial of Service attack BACK
  • 13.  BOTNET TECHNOLOGY  PHISHING TECHNOLOGY
  • 15. OUTLINE Introduction to Botnet  Botnet Life-cycle Botnet Detection  Preventing Botnet Infection Conclusion
  • 16. INTRODUCTION  A Botnet is a network of compromised computers underthe control of a remote attacker  controllerof a botnet is able to direct the activities of these compromised computers  Botnet Terminology  Bot Herder(Bot Master)  Bot  Bot Client  IRC Server  Command and Control Channel (C&C)
  • 17. INTRODUCTION  A Botnet is a network of compromised computers underthe control of a remote attacker  controllerof a botnet is able to direct the activities of these compromised computers  Botnet Terminology  Bot Herder(Bot Master)  Bot  Bot Client  IRC Server  Command and Control Channel (C&C)
  • 18. INTRODUCTION TO BOTNET(TERMINOLOGY) IRC Channel IRC Server Code Server IRC Channel C&C Traffic Updates Victi m Attack Bot Master
  • 23. BOTNET DETECTION:TRAFFIC MONITORING  Signature based: Detection of known botnets  Anomaly based: Detect botnet using following anomalies  High network latency  High volume of traffic  Traffic on unusual port  Unusual system behaviour  DNS based: Analysis of DNS traffic generated by botnets
  • 24. PREVENTING BOTNET INFECTIONS Use a Firewall  Use Antivirus (AV) software  Deploy an Intrusion Prevention System (IPS)  Define a Security Policy and  Share Policies with yourusers systematically
  • 25. CONCLUSION  Botnets pose a significant and growing threat against cybersecurity  It provides key platform formany cybercrimes (DDOS)  As network security has become integral part of ourlife and botnets have become the most serious threat to it  It is very important to detect botnet attack and find the solution forit
  • 26.
  • 27. Phishing Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. It tries to trick users with official-looking messages Credit card Bank account eBay Paypal Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 28. The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. So it doesn’t contains any useful information and hence falls under the category of spam. A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization. Techniques applied to spam message cant be applied naively to phishing messages.
  • 29. HOW TO PREVENT 1) Detect and block the phishing Web sites in time 2) Enhance the security of the web sites 3) Block the phishing e-mails by various spam filters 4) Install online anti-phishing software in user’s computers
  • 30.
  • 31. How to avoid Phishing DON’T CLICK THE LINK Type the site name in your browser (such as www.paypal.com) Never send sensitive account information by e- mail Account numbers, SSN, passwords Never give any password out to anyone Verify any person who contacts you (phone or email). If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.