Contents
What is cyber crime?
 Cyber crime refers to any crime that involves a
computer/mobile and a network. The computer
may have been used in the commission of a
crime, or it may be the target.
 Cyber hackers apply all sorts of techniques
(hacking, use of malware for intercepting data,
etc.) in stealing personal or financial data from
their victims, generally from their computers.
History
 The first spam email took place in 1978 when it was
sent out over the ARPANET (Advanced Research
Projects Agency Network).
 The first virus was installed on an Apple computer by a
high school student, Rich Skrenta in the year 1982.
CYBER THREAT EVOLUTION
Computer as a tool
 When the individual is the main target of the crime the computer can be
considered as a tool rather than target.
 These crimes are not done by technical experts.
 Eg: Spam, cyber stalking , cyber theft etc.
Computer as a target
 These crimes are committed by a selected
group of people with technical knowledge.
 Destruction of information in the
computer by spreading virus.
 Eg : Defacement, cyber terrorism etc.
Defacement
Computer as an instrumentality
 The crime is committed by manipulating the contents of computer
systems.
 With the advent of computer the criminal have started using the
technology as an aid for its perpetuation.
 Eg: money laundering.
Crime associated with prevalence of
computers
 Copyright violation
 Material copied from sources that are not public domain or
compatibly licensed without the permission of copyright holder.
 Copyright violation causes legal issues.
Types of cyber crime
• Financial crimes
• IP spoofing
• Trojan
• Web jacking
• Session Hijacking
• Mail bombing
• Key loggers
Types Of crime
• Financial crime includes credit card frauds, money
laundering, Forgery etc
• Money laundering is the process by which large amount of
illegally obtained money is given the appearance of having
originated from a legitimate source
IP Spoofing – Source Routing
Definition:
Attacker spoofs the address of another machine and inserts
itself between the attacked machine and the spoofed machine
to intercept replies
Replies sent back
to 10.10.20.30
Spoofed Address
10.10.20.30
Attacker
10.10.50.50
John
10.10.5.5
From Address: 10.10.20.30
To Address: 10.10.5.5
Attacker intercepts packets
as they go to 10.10.20.30
Trojan & Web Jacking
• Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program
which functions from inside what seems to be an authorized program, thereby
concealing what it is actually doing.
• Web jacking-This occurs when someone forcefully takes control of a website (by
cracking the password ). The actual owner of the website does not have any more
control over what appears on that website.
Attacker can
monitor the session
periodically inject commands into session
launch passive and active attacks from the session
Session Hijacking
Bob telnets to Server
Bob authenticates to Server
Bob
Attacker
Server
Die! Hi! I am Bob
Mail Bombing
• A mail bomb is the sending of a massive amount of e-mail to a
specific person or system. A huge amount of mail may simply fill
up the recipient's disk space on the server or, in some cases,
may be too much for a server to handle and may cause the
server to stop functioning.
Clickjacking
• Clickjacking is a form of cyber attack where the hacker uses an invisible layer over the
embedded web content (this could be an image, video or button) to intercept and
‘hijack’ you to a mirror website and mine information from you.
Keyloggers
• Keyloggers are regularly used in computers to log all the strokes a victim makes on the
keyboard.
Cyber security
• It is not possible to eliminate cyber crime from the cyber
space. It is quite possible to check them.
• Awareness is the first step in protecting yourself.
• Invest in Anti-virus, Firewall, and SPAM blocking software
for your PC.
• Change passwords on a regular basis
• Use complex passwords (include numbers and special
characters)
Cyber security
• Do not automatically check boxes before reading the
contents of any agreement of the software.
• Avoiding use of unauthorized software.
• Avoid opening of unknown emails.
• Use internet filtering software.
• Data Level Security Using encrypting software's
• Disable remote connectivity (such as Bluetooth)
ADVANTAGES OF CYBER SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing
data on our computer.
Conclusion
Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
universe.

Cyber security

  • 2.
  • 3.
    What is cybercrime?  Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.  Cyber hackers apply all sorts of techniques (hacking, use of malware for intercepting data, etc.) in stealing personal or financial data from their victims, generally from their computers.
  • 4.
    History  The firstspam email took place in 1978 when it was sent out over the ARPANET (Advanced Research Projects Agency Network).  The first virus was installed on an Apple computer by a high school student, Rich Skrenta in the year 1982.
  • 5.
  • 6.
    Computer as atool  When the individual is the main target of the crime the computer can be considered as a tool rather than target.  These crimes are not done by technical experts.  Eg: Spam, cyber stalking , cyber theft etc.
  • 7.
    Computer as atarget  These crimes are committed by a selected group of people with technical knowledge.  Destruction of information in the computer by spreading virus.  Eg : Defacement, cyber terrorism etc. Defacement
  • 8.
    Computer as aninstrumentality  The crime is committed by manipulating the contents of computer systems.  With the advent of computer the criminal have started using the technology as an aid for its perpetuation.  Eg: money laundering.
  • 9.
    Crime associated withprevalence of computers  Copyright violation  Material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder.  Copyright violation causes legal issues.
  • 10.
    Types of cybercrime • Financial crimes • IP spoofing • Trojan • Web jacking • Session Hijacking • Mail bombing • Key loggers
  • 11.
    Types Of crime •Financial crime includes credit card frauds, money laundering, Forgery etc • Money laundering is the process by which large amount of illegally obtained money is given the appearance of having originated from a legitimate source
  • 12.
    IP Spoofing –Source Routing Definition: Attacker spoofs the address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies Replies sent back to 10.10.20.30 Spoofed Address 10.10.20.30 Attacker 10.10.50.50 John 10.10.5.5 From Address: 10.10.20.30 To Address: 10.10.5.5 Attacker intercepts packets as they go to 10.10.20.30
  • 13.
    Trojan & WebJacking • Trojan Horse-A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. • Web jacking-This occurs when someone forcefully takes control of a website (by cracking the password ). The actual owner of the website does not have any more control over what appears on that website.
  • 14.
    Attacker can monitor thesession periodically inject commands into session launch passive and active attacks from the session Session Hijacking Bob telnets to Server Bob authenticates to Server Bob Attacker Server Die! Hi! I am Bob
  • 15.
    Mail Bombing • Amail bomb is the sending of a massive amount of e-mail to a specific person or system. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning.
  • 16.
    Clickjacking • Clickjacking isa form of cyber attack where the hacker uses an invisible layer over the embedded web content (this could be an image, video or button) to intercept and ‘hijack’ you to a mirror website and mine information from you.
  • 17.
    Keyloggers • Keyloggers areregularly used in computers to log all the strokes a victim makes on the keyboard.
  • 18.
    Cyber security • Itis not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. • Awareness is the first step in protecting yourself. • Invest in Anti-virus, Firewall, and SPAM blocking software for your PC. • Change passwords on a regular basis • Use complex passwords (include numbers and special characters)
  • 19.
    Cyber security • Donot automatically check boxes before reading the contents of any agreement of the software. • Avoiding use of unauthorized software. • Avoid opening of unknown emails. • Use internet filtering software. • Data Level Security Using encrypting software's • Disable remote connectivity (such as Bluetooth)
  • 20.
    ADVANTAGES OF CYBERSECURITY • Defend us from critical attacks. • Browse the safe website. • Internet security process all the incoming and outgoing data on our computer.
  • 21.
    Conclusion Technology is destructiveonly in the hands of people who do not realize that they are one and the same process as the universe.