- Compiled and presented by Mubaraka Halvadwala
Cyber Crime
Introduction
• World is coming closer.
• It is smaller place to live in
• Endless opportunity
• “Cyber Crimes”
• It is growing steadily
• Fastest-growing range of illegal activity
• Can happen Anytime or Anyplace
12/15/2015SNDTWU
1
• Cyber Crime: Introduction
• What is cybercrime?
• Definition of cyber crime
• History of Cyber Crime
• Cyber Crime in Modern Society
• Types of cyber crime
– Hacking
– Cyber Stalking
– Child Pornography
– Phishing
– Spoofing
– Piracy/ theft
– Bullying and Harassment
• Preventions
Content outline
12/15/2015SNDTWU
2
At the end of this webinar, you will be able to,
• Define and describe cyber crime in your own words
• Acquire information about the various types of cyber crime
that are present in our society
• Identify and state the types of cyber crime
• Describe the types of cyber crimes in your own words
• Illustrate the types of cyber crimes with suitable examples
• Discuss the ways to prevent cybercrime
Objectives
12/15/2015SNDTWU
3
• Illegal behavior directed by means of electronic
operations
• Targets the security of computer systems
• Cyber crime is a generic term
• The computer is either a tool or a target or both.
What is cybercrime?
12/15/2015SNDTWU
4
Cybercrime is a criminal offense on the Web, a criminal offense
regarding the Internet, a violation of law on the Internet, an
illegality committed with regard to the Internet.
–By Farlex
Definition of cyber crime
12/15/2015SNDTWU
5
12/15/2015SNDTWU
6
TypesHacking
Cyber
stalking
Identity theft
Child
pornography
Phishing
Spoofing
Piracy
Bullying
Hacking
It is the act of gaining unauthorized access to a computer system or
network and making unauthorized use of this access
Types of cyber crime
12/15/2015SNDTWU
7
Scenario 1 Scenario 2 Scenario 3
Scenario 1
The victim’s email account password is stolen
and the account is then misused for
sending out malicious code (virus, worm,
Trojan etc.) to people in the victim’s
address book. The recipients of these
viruses believe that the email is coming
from a known person and run the
attachments. This infects their computers
with the malicious code.
Types of cyber crimeHacking
12/15/2015SNDTWU
8
The victim’s email account password is stolen and the hacker tries to
extort money from the victim. The victim is threatened that if he
does not pay the money, the information contained in the emails
will be misused.
Types of cyber crimeHacking Scenario 2
12/15/2015SNDTWU
9
The victim’s email account password is stolen and obscene emails are
sent to people in the victim’s address book.
Types of cyber crimeHacking Scenario 3
12/15/2015SNDTWU
10
This is a kind of online harassment wherein the victim is subjected to a
bank of online messages and emails.
Types of cyber crimeCyberStalking
12/15/2015SNDTWU
11
Types of cyber crimeCyberStalking
12/15/2015SNDTWU
12
A criminal accesses data about a person’s bank account, credit
cards, Social Security, debit card and other sensitive information
to steal money or to buy things online in the victim’s name.
IdentityTheft
12/15/2015SNDTWU
13
Types of cyber crime
Criminals reach children and practice child sex abuse.
ChildPornography
12/15/2015SNDTWU
14
Types of cyber crime
It is the act of attempting to acquire information such as usernames,
passwords, and credit card details (and sometimes, indirectly,
money) by impersonating a trustworthy object in an electronic
communication.
Phishing
12/15/2015SNDTWU
15
Scenario 1
Types of cyber crime
The victim receives an email that appears to have been sent from his
bank. The email urges the victim to click on the link in the email.
When the victim does so, he is taken to “a secure page on the bank’s
website”. The victim believes the web page to be authentic and he
enters his username, password and other information. In reality, the
website is a fake and the victim’s information is stolen and misused.
Phishing Scenario 1
12/15/2015SNDTWU
16
Types of cyber crime
Getting one computer on a network to pretend to have the identity of
another computer, or developing a fake website which closely
resembles the original one.
Spoofing
12/15/2015SNDTWU
17
Types of cyber crime
Examples
Spoofing
12/15/2015SNDTWU
18
Types of cyber crime
Spoofing
12/15/2015SNDTWU
19
Types of cyber crime
Spoofing
12/15/2015SNDTWU
20
Types of cyber crime
This crime occurs when a person violates copyrights and downloads
music, movies, games and software.
12/15/2015SNDTWU
21
Piracy/theft Types of cyber crime
There have been several cases of teenagers bullying one another over
the Internet.
12/15/2015SNDTWU
22
Scenario 1 Scenario 2 Scenario 3
Bullying/Harassment Types of cyber crime
A fake profile of a woman is created on
Orkut. The profile displays her
correct name and contact
information (such as address,
residential phone number, cell
phone number etc.). Sometimes it
even has her photograph. The
problem is that the profile describes
her as a prostitute or a woman of
“loose character” who wants to have
sexual relations with anyone. Other
Orkut members see this profile and
start calling her at all hours of the
day asking for sexual favors. This
leads to a lot of harassment for the
victim and also defames her in
society.
Scenario 1
12/15/2015SNDTWU
23
Spoofing Types of cyber crime
An online hate community
is created. This
community displays
objectionable
information against a
particular country,
religion or ethnic group
or even against
national leaders and
historical figures.
12/15/2015SNDTWU
24
Scenario 2Spoofing Types of cyber crime
Preventions
12/15/2015SNDTWU
25
Use Strong Passwords
Install the latest operating system updates
Be a Social-Media Savvy
Secure your computer
Preventions
12/15/2015SNDTWU
26
Know the online warning signs
Avoid being trapped
Call the right person for help
Keep your family safe
Preventions
12/15/2015SNDTWU
27
Protect your e-identity
Secure your wireless network
Protect Your Data
Cyber Crime - What is it ?
Cyber Crime - What is it ?

Cyber Crime - What is it ?

  • 1.
    - Compiled andpresented by Mubaraka Halvadwala Cyber Crime
  • 2.
    Introduction • World iscoming closer. • It is smaller place to live in • Endless opportunity • “Cyber Crimes” • It is growing steadily • Fastest-growing range of illegal activity • Can happen Anytime or Anyplace 12/15/2015SNDTWU 1
  • 3.
    • Cyber Crime:Introduction • What is cybercrime? • Definition of cyber crime • History of Cyber Crime • Cyber Crime in Modern Society • Types of cyber crime – Hacking – Cyber Stalking – Child Pornography – Phishing – Spoofing – Piracy/ theft – Bullying and Harassment • Preventions Content outline 12/15/2015SNDTWU 2
  • 4.
    At the endof this webinar, you will be able to, • Define and describe cyber crime in your own words • Acquire information about the various types of cyber crime that are present in our society • Identify and state the types of cyber crime • Describe the types of cyber crimes in your own words • Illustrate the types of cyber crimes with suitable examples • Discuss the ways to prevent cybercrime Objectives 12/15/2015SNDTWU 3
  • 5.
    • Illegal behaviordirected by means of electronic operations • Targets the security of computer systems • Cyber crime is a generic term • The computer is either a tool or a target or both. What is cybercrime? 12/15/2015SNDTWU 4
  • 6.
    Cybercrime is acriminal offense on the Web, a criminal offense regarding the Internet, a violation of law on the Internet, an illegality committed with regard to the Internet. –By Farlex Definition of cyber crime 12/15/2015SNDTWU 5
  • 7.
  • 8.
    Hacking It is theact of gaining unauthorized access to a computer system or network and making unauthorized use of this access Types of cyber crime 12/15/2015SNDTWU 7 Scenario 1 Scenario 2 Scenario 3
  • 9.
    Scenario 1 The victim’semail account password is stolen and the account is then misused for sending out malicious code (virus, worm, Trojan etc.) to people in the victim’s address book. The recipients of these viruses believe that the email is coming from a known person and run the attachments. This infects their computers with the malicious code. Types of cyber crimeHacking 12/15/2015SNDTWU 8
  • 10.
    The victim’s emailaccount password is stolen and the hacker tries to extort money from the victim. The victim is threatened that if he does not pay the money, the information contained in the emails will be misused. Types of cyber crimeHacking Scenario 2 12/15/2015SNDTWU 9
  • 11.
    The victim’s emailaccount password is stolen and obscene emails are sent to people in the victim’s address book. Types of cyber crimeHacking Scenario 3 12/15/2015SNDTWU 10
  • 12.
    This is akind of online harassment wherein the victim is subjected to a bank of online messages and emails. Types of cyber crimeCyberStalking 12/15/2015SNDTWU 11
  • 13.
    Types of cybercrimeCyberStalking 12/15/2015SNDTWU 12
  • 14.
    A criminal accessesdata about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to steal money or to buy things online in the victim’s name. IdentityTheft 12/15/2015SNDTWU 13 Types of cyber crime
  • 15.
    Criminals reach childrenand practice child sex abuse. ChildPornography 12/15/2015SNDTWU 14 Types of cyber crime
  • 16.
    It is theact of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by impersonating a trustworthy object in an electronic communication. Phishing 12/15/2015SNDTWU 15 Scenario 1 Types of cyber crime
  • 17.
    The victim receivesan email that appears to have been sent from his bank. The email urges the victim to click on the link in the email. When the victim does so, he is taken to “a secure page on the bank’s website”. The victim believes the web page to be authentic and he enters his username, password and other information. In reality, the website is a fake and the victim’s information is stolen and misused. Phishing Scenario 1 12/15/2015SNDTWU 16 Types of cyber crime
  • 18.
    Getting one computeron a network to pretend to have the identity of another computer, or developing a fake website which closely resembles the original one. Spoofing 12/15/2015SNDTWU 17 Types of cyber crime Examples
  • 19.
  • 20.
  • 21.
  • 22.
    This crime occurswhen a person violates copyrights and downloads music, movies, games and software. 12/15/2015SNDTWU 21 Piracy/theft Types of cyber crime
  • 23.
    There have beenseveral cases of teenagers bullying one another over the Internet. 12/15/2015SNDTWU 22 Scenario 1 Scenario 2 Scenario 3 Bullying/Harassment Types of cyber crime
  • 24.
    A fake profileof a woman is created on Orkut. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc.). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of “loose character” who wants to have sexual relations with anyone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favors. This leads to a lot of harassment for the victim and also defames her in society. Scenario 1 12/15/2015SNDTWU 23 Spoofing Types of cyber crime
  • 25.
    An online hatecommunity is created. This community displays objectionable information against a particular country, religion or ethnic group or even against national leaders and historical figures. 12/15/2015SNDTWU 24 Scenario 2Spoofing Types of cyber crime
  • 26.
    Preventions 12/15/2015SNDTWU 25 Use Strong Passwords Installthe latest operating system updates Be a Social-Media Savvy Secure your computer
  • 27.
    Preventions 12/15/2015SNDTWU 26 Know the onlinewarning signs Avoid being trapped Call the right person for help Keep your family safe
  • 28.