An overview of different
Cyber Attacks
Cyber Crime
Learning Goal’s
• Demystifying Cyber Crime.
• Common Scenarios in Cyber Crime.
• Cyber Crime in India.
• Cyber Attacks.
• Cyber Laws in India.
• Securing Yourself – Do’s and Don’ts
• DCS – Doubt Clearing Session.
• Salutations.
DEMYSTIFYING CYBER CRIME
Cyber Crime
• ā€œCrimes are not to be measured by the issue of
events, but by the bad intensions of men.ā€
• ā€œThe greatest crimes do
not arise from a want of
feeling for others but from
an over sensibility for
ourselves and an
over indulgence in our own
desires.ā€
What is Cyber Crime ?
• Cyber Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks. It is also used to include
traditional crimes in which computers or networks are used to
enable the illicit activity.
• Computer crime mainly consists of unauthorized access to computer
systems data alteration, data destruction, theft of intellectual
property.
• Cyber crime in the context of national security may involve hacking,
traditional espionage, or information warfare and related activities.
Unauthorized access: This occurs when a user/hacker
deliberately gets access into someone else’s network either
to monitor or data destruction purposes
Denial of service attack: It involves sending of
disproportionate demands or data to the victims server
beyond the limit that the server is capable to handle and
hence causes the server to crash
Virus, Worms and Trojan attacks: Viruses are basically
programs that are attached to a file which then gets
circulated to other files and gradually to other computers in
the network.
Worms unlike Viruses do not need a host for attachments
they make copies of themselves and do this repeatedly
hence eating up all the memory of the computer.
Trojans are unauthorized programs which functions from
inside what seems to be an authorized program, thereby
concealing what it is actually doing.
Common scenarios in Cyber Crime
Cyber Crimes in India
The major Cyber Crimes reported, in India,
are Denial of Services, Defacement of Websites, Spam, Computer
Virus and Worms, Pornography, Cyber Squatting, Cyber
Stalking and Phishing.
India stands 11th in the ranking for Cyber Crime in the World,
constituting3% of the Global Cyber Crime.
Cyber Crime in India : Statistics
Why India ?
A rapidly growing online user base
 121 Million Internet Users
 65 Million Active Internet Users, up by 28% from 51
million in 2010
 50 Million users shop online on Ecommerce and Online
Shopping Sites
 46+ Million Social Network Users
 346 million mobile users had subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial 2011
 The majority of cybercrimes are centered on forgery, fraud and
Phishing,
 India is the third-most targeted country for Phishing attacks
after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
Cyber Crime In India
Wednesday, 25 February 2015
Cyber Crime in India
A total number of 90, 119, 252 and 219 Government websites tracked
by the Indian Computer Emergency Response Team (CERT-In) were
hacked / defaced by various hacker groups in the year 2008, 2009,
2010 and Jan–Oct 2011 respectively
CYBER ATTACKS
Think before you Click
Nigerian 419 Fraud Scheme
• It is a type of Confidence trick or using SE (Social
Engineering)
• The term ā€œ419 ā€œ comes from the Section of the
Nigerian Penal Code.
• Persuade someone to give out a sum of money using
scam or false promises.
• Methods :-
– False Company Job Scam.
– Online Buy/Sell Goods
– Online Dating Services.
Packet Sniffing
• Packet Sniffing is a method of tapping each packet as
it flows across the networks.
• User sniffs data belonging to other users in the
network.
• Packet Sniffers can be used as a hacking tool.
• Network Sniffers can capture passwords and other
sensitive information through the network.
• Tools of Packet Sniffing : Wireshark, tcpdump,
Ettercap etc.
Phishing & Spoofing Attacks
• ā€˜Spoof’ word came into existence from a game
invented by Arthur Roberts in 19th century.
• Spoofing means personating as some other
authorized vendor to trick
users into believing a system
as legitimate.
• Types –
– Email Spoofing
– IP-Spoofing
– DNS-Spoofing
..contd.
• Spoofing attacks used to trick people into revealing
confidential data is Phishing.
• ā€œPhishing is the attempt to acquire sensitive
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money) by masquerading as a trustworthy entity in
an electronic communication.ā€ --- Wikipedia
..contd.
• IP spoofing can be accomplished using proxy servers
and simple PHP scripts that are readily and freely
available.
• Email spoofing is where spammers try to trick spam
filters by making spam look like it comes from a
legitimate address. They do this by manipulating the
email header to display your email in the ā€œfromā€
address, hence why you get bounces back and others
believe the junk mail is coming from you.
DNS Spoofing
• DNS spoofing (or DNS cache poisoning) is a computer hacking
attack, whereby data is introduced into a Domain Name
System (DNS) resolver's cache, causing the name server to
return an incorrect IP address, diverting traffic to the
attacker's computer (or any other computer).
Piggy Backing
• Access Wireless connection authorized to another
individual without rightful permission.
• It is used as a means to hide illegal activities like
identity theft, pornography etc.
• Piggybacking != Wardriving
• Wardrivers collect info about unsecured wi-fi access
while driving in a vehicle. It involves logging and
mapping of access points.
Software Piracy
• Software Piracy is the illegal distribution,
unauthorized reproduction of software for business
or personal use.
• Its Illegal and Punishable by law.
• Huge impact on global economy.
• In 2007, IT Industry suffered a loss of $39.6 Billion
Anti- copyright infringement organizations
1. Business Software Alliance (BSA)
2. Canadian Alliance Against Software Theft (CAAST)
3. Federation Against Software Theft (FAST) and more …
Pod Slurping
• An act of using a portable data storage device to
facilitate data theft.
• Increasing Security risk.
• Stores malicious code or program that steal
credentials or other personalized data.
Source Code Poisoning
• Embed Malicious Code in chunks in a Software’s
code.
• Software’s can be trojanized.
• Can be done by developers or testers or contributors.
• Prevention is achievable with proper design of
Compilers.
CYBER LAWS IN INDIA
Cyber Laws in India
• The Information Technology Act, 2000
• The Information Technology Amendment Act, 2008
Section 66E - Punishment for violation of privacy.
ā€œWhoever, intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without
his or her consent, under circumstances violating the
privacy of that person, shall be punished with
imprisonment which may extend to three years or with fine
not exceeding two lakh rupees, or with bothā€
SECURING YOURSELF
DO’S & DON’TS
DO’s
• Install and use a firewall, pop-up blockers and
spyware detectors.
• Use an up-to-date Anti Virus.
• Create backups of important files and folders
• Use Strong Passwords.
• Encrypt the Network traffic. (Use a Paid VPN)
• Change Passwords after some interval.
• Do not store passwords or bank logins in your OS.
• Clear Spams regularly.
Etc. etc.
Don’ts
• Give unnecessary details about your being and
current living status.
• Hand over your credit card to any person.
• Auto Connect to Open Wi-fi
• Save Passwords in web browsers.
• Open Emails if not sure about it.
• Open email Attachments with unsatisfactory details.
QUESTIONS ? DOUBTS ?
THANK YOU

Cyber Crime

  • 1.
    An overview ofdifferent Cyber Attacks Cyber Crime
  • 2.
    Learning Goal’s • DemystifyingCyber Crime. • Common Scenarios in Cyber Crime. • Cyber Crime in India. • Cyber Attacks. • Cyber Laws in India. • Securing Yourself – Do’s and Don’ts • DCS – Doubt Clearing Session. • Salutations.
  • 3.
  • 4.
    Cyber Crime • ā€œCrimesare not to be measured by the issue of events, but by the bad intensions of men.ā€ • ā€œThe greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires.ā€
  • 5.
    What is CyberCrime ? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. • Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. • Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.
  • 6.
    Unauthorized access: Thisoccurs when a user/hacker deliberately gets access into someone else’s network either to monitor or data destruction purposes Denial of service attack: It involves sending of disproportionate demands or data to the victims server beyond the limit that the server is capable to handle and hence causes the server to crash Virus, Worms and Trojan attacks: Viruses are basically programs that are attached to a file which then gets circulated to other files and gradually to other computers in the network. Worms unlike Viruses do not need a host for attachments they make copies of themselves and do this repeatedly hence eating up all the memory of the computer. Trojans are unauthorized programs which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. Common scenarios in Cyber Crime
  • 7.
    Cyber Crimes inIndia The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing.
  • 8.
    India stands 11thin the ranking for Cyber Crime in the World, constituting3% of the Global Cyber Crime. Cyber Crime in India : Statistics
  • 9.
    Why India ? Arapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial 2011
  • 10.
     The majorityof cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. Cyber Crime In India Wednesday, 25 February 2015
  • 11.
    Cyber Crime inIndia A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively
  • 12.
  • 13.
    Nigerian 419 FraudScheme • It is a type of Confidence trick or using SE (Social Engineering) • The term ā€œ419 ā€œ comes from the Section of the Nigerian Penal Code. • Persuade someone to give out a sum of money using scam or false promises. • Methods :- – False Company Job Scam. – Online Buy/Sell Goods – Online Dating Services.
  • 14.
    Packet Sniffing • PacketSniffing is a method of tapping each packet as it flows across the networks. • User sniffs data belonging to other users in the network. • Packet Sniffers can be used as a hacking tool. • Network Sniffers can capture passwords and other sensitive information through the network. • Tools of Packet Sniffing : Wireshark, tcpdump, Ettercap etc.
  • 15.
    Phishing & SpoofingAttacks • ā€˜Spoof’ word came into existence from a game invented by Arthur Roberts in 19th century. • Spoofing means personating as some other authorized vendor to trick users into believing a system as legitimate. • Types – – Email Spoofing – IP-Spoofing – DNS-Spoofing
  • 16.
    ..contd. • Spoofing attacksused to trick people into revealing confidential data is Phishing. • ā€œPhishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.ā€ --- Wikipedia
  • 17.
    ..contd. • IP spoofingcan be accomplished using proxy servers and simple PHP scripts that are readily and freely available. • Email spoofing is where spammers try to trick spam filters by making spam look like it comes from a legitimate address. They do this by manipulating the email header to display your email in the ā€œfromā€ address, hence why you get bounces back and others believe the junk mail is coming from you.
  • 18.
    DNS Spoofing • DNSspoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer).
  • 19.
    Piggy Backing • AccessWireless connection authorized to another individual without rightful permission. • It is used as a means to hide illegal activities like identity theft, pornography etc. • Piggybacking != Wardriving • Wardrivers collect info about unsecured wi-fi access while driving in a vehicle. It involves logging and mapping of access points.
  • 20.
    Software Piracy • SoftwarePiracy is the illegal distribution, unauthorized reproduction of software for business or personal use. • Its Illegal and Punishable by law. • Huge impact on global economy. • In 2007, IT Industry suffered a loss of $39.6 Billion Anti- copyright infringement organizations 1. Business Software Alliance (BSA) 2. Canadian Alliance Against Software Theft (CAAST) 3. Federation Against Software Theft (FAST) and more …
  • 21.
    Pod Slurping • Anact of using a portable data storage device to facilitate data theft. • Increasing Security risk. • Stores malicious code or program that steal credentials or other personalized data.
  • 22.
    Source Code Poisoning •Embed Malicious Code in chunks in a Software’s code. • Software’s can be trojanized. • Can be done by developers or testers or contributors. • Prevention is achievable with proper design of Compilers.
  • 23.
  • 24.
    Cyber Laws inIndia • The Information Technology Act, 2000 • The Information Technology Amendment Act, 2008 Section 66E - Punishment for violation of privacy. ā€œWhoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with bothā€
  • 25.
  • 26.
    DO’s • Install anduse a firewall, pop-up blockers and spyware detectors. • Use an up-to-date Anti Virus. • Create backups of important files and folders • Use Strong Passwords. • Encrypt the Network traffic. (Use a Paid VPN) • Change Passwords after some interval. • Do not store passwords or bank logins in your OS. • Clear Spams regularly. Etc. etc.
  • 27.
    Don’ts • Give unnecessarydetails about your being and current living status. • Hand over your credit card to any person. • Auto Connect to Open Wi-fi • Save Passwords in web browsers. • Open Emails if not sure about it. • Open email Attachments with unsatisfactory details.
  • 28.
  • 29.