SlideShare a Scribd company logo
A. B. M. Ashikur Rahman
Asst. Professor,
Dept. of CSE, IUT
Cybercrimes
and
Cybercriminals
Comparison
• Real world is more lively.
• In virtual world, we can feel
but can not touch
• Most of the case, computer
simulation needed for virtual
world
Real world Vs Virtual world
Cybercrimes
Definitions:
Crime:
• Action against Law
• unlawful act punishable by a state or other authority.
Cybercrime:
• Fastest growing area of crime (INTERPOL)
• computer oriented crime
• A threat to the privacy, security and reliability of someone in virtual world
Cybercrimes
Tools & Methods:
• Social Engineering
• Malwares(Malicious softwares)
• Virus
• Worms
• Spyware
• Trojan Horse
• Ransomware
• Adware
• Scareware etc.
Cybercrimes
Categories:
• Cyberbullying
• Cyber Extortion
• Phishing
• Identity Theft
• Scamming
• Cyberlaundering
• Copyright Infringement
• DDoS Attack
• Prohibited offensive and illegal content
• Others
Cybercrimes
Cyberbullying
• Bullying is a form of aggressive behavior manifested by the use of force or coercion
to affect others, particularly when the behavior is habitual and involves an imbalanc
e of power.
• It can include-
• verbal harassment,
• physical assault or coercion
• Harassment on grounds of race, religion, gender, sexuality, or ability
• Cyber-bullying is any bullying done through the use of technology.
Cybercrimes
Cyberbullying
Real World
Virtual World
Cybercrimes
Cyber Extortion
• More likely kidnapping and blackmailing
in real world
• Attacker use Malware (ransomeware) to
gain control over data
• Encrypt or copy data, image, files and
threaten to destroy or reveal
• Give access in exchange of money
• Most of the time they take virtual money
like bilcoin.
Cybercrimes
Phishing & Identity Theft
Cybercrimes
Phishing & Identity Theft
• Also known as e-mail spoofing
• Fake e-mail source
• Ask for sensitive information
• Use those info to commit crime like-
• Identity theft
• Credit card theft
• Spread rumors
• Fraud etc.
Cybercrimes
Identity Theft
If a criminal steals your identity, they may use it to:
• trick your bank or financial institution into giving them access to your money and other accounts,
• open new accounts and build up debts in your name which can ruin your credit rating,
• take control of your accounts, including by changing the address on your credit card or other accounts
so you don’t receive statements and don’t realize there is a problem,
• open a phone, internet or other service account in your name,
• claim government benefits in your name,
• lodge fraudulent claims for tax refunds in your name and preventing you from being able to lodge your
legitimate return,
• use your name to plan or commit criminal activity, and
• Pretend to be you to embarrass or misrepresent you, such as through social media
Cybercrimes
Scamming
• Very similar to phishing
• Happens a lot in our country
• To cheat, attacker uses bait like
• Lottery winning scam
• New job offer
• Unintentional money transfer
• Fake news to collect money from friends
Cybercrimes
Cyberlaundering
• Money laundering 2.0
• Re-routes money through online banking
• Illegitimate money becomes real money
• Exactly like real world money laundering but uses technology
Cybercrimes
Copyright Infringement
• Making copy of some intellectual property without the permission of t
he owner (piracy)
• Example:
• YouTube video
• Kickass torrent
Cybercrimes
DDoS Attack
• an interruption of service resulting from system unavailability
• prevents any part of a target system from functioning as planned
• Create millions of service request
to create congestion
• It actually used to harm some
organization
•HSBC Attack
•GitHub Repository
Cybercrimes
Prohibited offensive and illegal content
Prohibited offensive content includes:
• depiction of actual sexual activity between adults
• videos showing very high-impact violence
• footage detailing offensive sexual practices
• material providing detailed instruction in crime
Cybercrimes
Others:
• Online gambling
• Issues in online trading
• Spreading fake news
• Spreading rumors
• Cyber defamation
Hackers
• basically refer to any skilled computer programmer
• a person who, with their technical knowledge, uses bugs or exploits to break into computer
systems.
• Motives:
1. monetary gain, especially when it involves breaking into systems with the specific purpose of
stealing credit card numbers or manipulating banking systems.
2. egoistic motives; to increase their reputation within the hacker subculture, leaving their signatures
on the system or network after a breach.
3. corporate spies allow organizations to possess information on services and products that may be
hijacked or used as a leverage within the marketplace.
4. some hackers do it for patriotic reasons; as in state-sponsored cyber attacks during wartime.
Hackers: Categories
Non-professionals:
• Blue Hat Hacker
• Script Kiddie
• Green Hat Hacker
Social Workers:
• Grey Hat Hacker
• Hactivists
Professionals:
• White Hat Hacker
• State/Nation Sponsored Hackers
• Elite Hackers
• Red Hat Hacker
Criminals:
• Cyber Terrorists
• Black Hat Hacker
• Social Engineering Hackers
• Malicious Insider/Whistle-blower Hacker
Script Kiddies:
• This refers to the newbies.
• They don’t cause excessive damage.
• They use downloaded hacking software or purchased scripts to bombard traffic sites or si
mply disrupt the regular activity of a website.
Non-professionals
• Blue Hat Hackers (Amateurs):
• ill motives such as revenge attacks.
• Green Hat Hackers:
• Tutorial Learners
Black Hat Hackers
• Known as “Crackers”
• Bad guy who is a intruder to the system
• Main motive is to gain access to some valuable
resource
• Sometimes, motive is reputation
Career Criminals
• Computer experts lured by the profit of cybercrimes
• Works on Darknet to continue their crime
• Always look for bigger scores
• Organized and quick
• break into computer systems to stir up violence
Cyber Terrorist
Insiders & Ex-employee
• At the beginning, most of the attack was carried out by in-house employees
• Insiders know pros and cons of the system
• Easy to gain some unauthorized access
• Ex-employees have motive
• They have no strings attached
Whistle-blower Hacker
Social Engineering Hackers
-uses psychological manipulation to make people to divulge private contents
Example:
bKash frauds
Techniques used:
Phishing, Vishing, Smishing, Impersonation, baiting
Target:
- Gain trust of the victim
- Obtain sensitive information
- Use the victim to perform specific action
Social Workers
Hacktivists:
• Mixture of pure hacking and activism
• Hacktivists are conscious hackers with a cause
• carry out their activism in an electronic form
• Example-
• Environment Campaign
• “Reform Quota System” strike
Gray hat Hackers:
• exploit the internet systems only to make public
certain vast datasets of information that would
be of benefit to everyone
• Example-
• Panama Papers (John Doe)
• WikiLeaks
Professionals
Red Hat Hackers:
• find black hat hackers, intercept and destroy
their schemes
• Employed by the govt. agencies
• can be a free lancer too.
Elite Hackers:
• the “cutting-edge geniuses”.
• the real experts and the innovators in the field of
hacking
• Legends in their fields
• Top of the hacker chain
• Sometimes work as consultants
Political or Commercial Group
• Want to fulfill their agenda
• Backed up by higher authority, sometimes Governments
• Example:
• Israel’s attack on Iran’s Nuclear plant using “STUXNET”
State/Nation Sponsored Hackers
State/Nation Sponsored Hackers
• Known as “White Hat Hackers”
• know how to find and exploit vulnerabilities and weaknesses in systems
• uses those skills in a legitimate, lawful manner to try to find vulnerabilities
and fix them
• More likely penetration tester
• there’s even a professional certification for ethical hackers: the Certified
Ethical Hacker (CEH).
White Hat (Ethical) Hackers
Thank You

More Related Content

What's hot

Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
Bradley W. Deacon
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
lydneat
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
fwscholl
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
ICCT foundation inc
 
Computer crime
Computer crimeComputer crime
Computer crime
Surya Prasad
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
Jack Kessler
 
computer crime
computer crimecomputer crime
computer crime
00jitesh00
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
HHSome
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Computer crime
 Computer crime Computer crime
Computer crime
Anika Rahman Orin
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 

What's hot (20)

Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Digital Law Powerpoint
Digital Law PowerpointDigital Law Powerpoint
Digital Law Powerpoint
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
computer crime
computer crimecomputer crime
computer crime
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
English in written
English in writtenEnglish in written
English in written
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 

Similar to Cybercrimes and Cybercriminals

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
ssuser8b4eb21
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
806670
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
Adarsh
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
DrPraveenKumar37
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
Klaus Drosch
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
silambarasansam
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Goutham Shetty
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
Deepu Näñí
 
Hacking
HackingHacking
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Cyber security
Cyber securityCyber security
Cyber security
PawanKalyanAmbati
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Ashwini831102
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
Prem Lamsal
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
chrixymae
 

Similar to Cybercrimes and Cybercriminals (20)

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 

More from Ashikur Rahman

Graph Theory: Matrix representation of graphs
Graph Theory: Matrix representation of graphsGraph Theory: Matrix representation of graphs
Graph Theory: Matrix representation of graphs
Ashikur Rahman
 
SOP writing: What, Why & How
SOP writing: What, Why & HowSOP writing: What, Why & How
SOP writing: What, Why & How
Ashikur Rahman
 
Graph Theory: Planarity & Dual Graph
Graph Theory: Planarity & Dual GraphGraph Theory: Planarity & Dual Graph
Graph Theory: Planarity & Dual Graph
Ashikur Rahman
 
Graph Theory: Connectivity & Isomorphism
Graph Theory: Connectivity & Isomorphism Graph Theory: Connectivity & Isomorphism
Graph Theory: Connectivity & Isomorphism
Ashikur Rahman
 
Graph Theory: Cut-Set and Cut-Vertices
Graph Theory: Cut-Set and Cut-VerticesGraph Theory: Cut-Set and Cut-Vertices
Graph Theory: Cut-Set and Cut-Vertices
Ashikur Rahman
 
Graph Theory: Trees
Graph Theory: TreesGraph Theory: Trees
Graph Theory: Trees
Ashikur Rahman
 
Graph Theory: Paths & Cycles
Graph Theory: Paths & CyclesGraph Theory: Paths & Cycles
Graph Theory: Paths & Cycles
Ashikur Rahman
 
E-Marketing and Advertising Concepts
E-Marketing and Advertising ConceptsE-Marketing and Advertising Concepts
E-Marketing and Advertising Concepts
Ashikur Rahman
 
Outlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Outlier analysis,Chapter-12, Data Mining: Concepts and TechniquesOutlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Outlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Ashikur Rahman
 
Machine learning algorithms for data mining
Machine learning algorithms for data miningMachine learning algorithms for data mining
Machine learning algorithms for data mining
Ashikur Rahman
 
Signature verification Using SIFT Features
Signature verification Using SIFT FeaturesSignature verification Using SIFT Features
Signature verification Using SIFT Features
Ashikur Rahman
 

More from Ashikur Rahman (11)

Graph Theory: Matrix representation of graphs
Graph Theory: Matrix representation of graphsGraph Theory: Matrix representation of graphs
Graph Theory: Matrix representation of graphs
 
SOP writing: What, Why & How
SOP writing: What, Why & HowSOP writing: What, Why & How
SOP writing: What, Why & How
 
Graph Theory: Planarity & Dual Graph
Graph Theory: Planarity & Dual GraphGraph Theory: Planarity & Dual Graph
Graph Theory: Planarity & Dual Graph
 
Graph Theory: Connectivity & Isomorphism
Graph Theory: Connectivity & Isomorphism Graph Theory: Connectivity & Isomorphism
Graph Theory: Connectivity & Isomorphism
 
Graph Theory: Cut-Set and Cut-Vertices
Graph Theory: Cut-Set and Cut-VerticesGraph Theory: Cut-Set and Cut-Vertices
Graph Theory: Cut-Set and Cut-Vertices
 
Graph Theory: Trees
Graph Theory: TreesGraph Theory: Trees
Graph Theory: Trees
 
Graph Theory: Paths & Cycles
Graph Theory: Paths & CyclesGraph Theory: Paths & Cycles
Graph Theory: Paths & Cycles
 
E-Marketing and Advertising Concepts
E-Marketing and Advertising ConceptsE-Marketing and Advertising Concepts
E-Marketing and Advertising Concepts
 
Outlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Outlier analysis,Chapter-12, Data Mining: Concepts and TechniquesOutlier analysis,Chapter-12, Data Mining: Concepts and Techniques
Outlier analysis,Chapter-12, Data Mining: Concepts and Techniques
 
Machine learning algorithms for data mining
Machine learning algorithms for data miningMachine learning algorithms for data mining
Machine learning algorithms for data mining
 
Signature verification Using SIFT Features
Signature verification Using SIFT FeaturesSignature verification Using SIFT Features
Signature verification Using SIFT Features
 

Recently uploaded

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 

Recently uploaded (20)

Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 

Cybercrimes and Cybercriminals

  • 1. A. B. M. Ashikur Rahman Asst. Professor, Dept. of CSE, IUT Cybercrimes and Cybercriminals
  • 2. Comparison • Real world is more lively. • In virtual world, we can feel but can not touch • Most of the case, computer simulation needed for virtual world Real world Vs Virtual world
  • 3. Cybercrimes Definitions: Crime: • Action against Law • unlawful act punishable by a state or other authority. Cybercrime: • Fastest growing area of crime (INTERPOL) • computer oriented crime • A threat to the privacy, security and reliability of someone in virtual world
  • 4. Cybercrimes Tools & Methods: • Social Engineering • Malwares(Malicious softwares) • Virus • Worms • Spyware • Trojan Horse • Ransomware • Adware • Scareware etc.
  • 5. Cybercrimes Categories: • Cyberbullying • Cyber Extortion • Phishing • Identity Theft • Scamming • Cyberlaundering • Copyright Infringement • DDoS Attack • Prohibited offensive and illegal content • Others
  • 6. Cybercrimes Cyberbullying • Bullying is a form of aggressive behavior manifested by the use of force or coercion to affect others, particularly when the behavior is habitual and involves an imbalanc e of power. • It can include- • verbal harassment, • physical assault or coercion • Harassment on grounds of race, religion, gender, sexuality, or ability • Cyber-bullying is any bullying done through the use of technology.
  • 8. Cybercrimes Cyber Extortion • More likely kidnapping and blackmailing in real world • Attacker use Malware (ransomeware) to gain control over data • Encrypt or copy data, image, files and threaten to destroy or reveal • Give access in exchange of money • Most of the time they take virtual money like bilcoin.
  • 10. Cybercrimes Phishing & Identity Theft • Also known as e-mail spoofing • Fake e-mail source • Ask for sensitive information • Use those info to commit crime like- • Identity theft • Credit card theft • Spread rumors • Fraud etc.
  • 11. Cybercrimes Identity Theft If a criminal steals your identity, they may use it to: • trick your bank or financial institution into giving them access to your money and other accounts, • open new accounts and build up debts in your name which can ruin your credit rating, • take control of your accounts, including by changing the address on your credit card or other accounts so you don’t receive statements and don’t realize there is a problem, • open a phone, internet or other service account in your name, • claim government benefits in your name, • lodge fraudulent claims for tax refunds in your name and preventing you from being able to lodge your legitimate return, • use your name to plan or commit criminal activity, and • Pretend to be you to embarrass or misrepresent you, such as through social media
  • 12. Cybercrimes Scamming • Very similar to phishing • Happens a lot in our country • To cheat, attacker uses bait like • Lottery winning scam • New job offer • Unintentional money transfer • Fake news to collect money from friends
  • 13. Cybercrimes Cyberlaundering • Money laundering 2.0 • Re-routes money through online banking • Illegitimate money becomes real money • Exactly like real world money laundering but uses technology
  • 14. Cybercrimes Copyright Infringement • Making copy of some intellectual property without the permission of t he owner (piracy) • Example: • YouTube video • Kickass torrent
  • 15. Cybercrimes DDoS Attack • an interruption of service resulting from system unavailability • prevents any part of a target system from functioning as planned • Create millions of service request to create congestion • It actually used to harm some organization •HSBC Attack •GitHub Repository
  • 16. Cybercrimes Prohibited offensive and illegal content Prohibited offensive content includes: • depiction of actual sexual activity between adults • videos showing very high-impact violence • footage detailing offensive sexual practices • material providing detailed instruction in crime
  • 17. Cybercrimes Others: • Online gambling • Issues in online trading • Spreading fake news • Spreading rumors • Cyber defamation
  • 18. Hackers • basically refer to any skilled computer programmer • a person who, with their technical knowledge, uses bugs or exploits to break into computer systems. • Motives: 1. monetary gain, especially when it involves breaking into systems with the specific purpose of stealing credit card numbers or manipulating banking systems. 2. egoistic motives; to increase their reputation within the hacker subculture, leaving their signatures on the system or network after a breach. 3. corporate spies allow organizations to possess information on services and products that may be hijacked or used as a leverage within the marketplace. 4. some hackers do it for patriotic reasons; as in state-sponsored cyber attacks during wartime.
  • 19. Hackers: Categories Non-professionals: • Blue Hat Hacker • Script Kiddie • Green Hat Hacker Social Workers: • Grey Hat Hacker • Hactivists Professionals: • White Hat Hacker • State/Nation Sponsored Hackers • Elite Hackers • Red Hat Hacker Criminals: • Cyber Terrorists • Black Hat Hacker • Social Engineering Hackers • Malicious Insider/Whistle-blower Hacker
  • 20. Script Kiddies: • This refers to the newbies. • They don’t cause excessive damage. • They use downloaded hacking software or purchased scripts to bombard traffic sites or si mply disrupt the regular activity of a website. Non-professionals • Blue Hat Hackers (Amateurs): • ill motives such as revenge attacks. • Green Hat Hackers: • Tutorial Learners
  • 21. Black Hat Hackers • Known as “Crackers” • Bad guy who is a intruder to the system • Main motive is to gain access to some valuable resource • Sometimes, motive is reputation
  • 22. Career Criminals • Computer experts lured by the profit of cybercrimes • Works on Darknet to continue their crime • Always look for bigger scores • Organized and quick • break into computer systems to stir up violence Cyber Terrorist
  • 23. Insiders & Ex-employee • At the beginning, most of the attack was carried out by in-house employees • Insiders know pros and cons of the system • Easy to gain some unauthorized access • Ex-employees have motive • They have no strings attached Whistle-blower Hacker
  • 24. Social Engineering Hackers -uses psychological manipulation to make people to divulge private contents Example: bKash frauds Techniques used: Phishing, Vishing, Smishing, Impersonation, baiting Target: - Gain trust of the victim - Obtain sensitive information - Use the victim to perform specific action
  • 25. Social Workers Hacktivists: • Mixture of pure hacking and activism • Hacktivists are conscious hackers with a cause • carry out their activism in an electronic form • Example- • Environment Campaign • “Reform Quota System” strike Gray hat Hackers: • exploit the internet systems only to make public certain vast datasets of information that would be of benefit to everyone • Example- • Panama Papers (John Doe) • WikiLeaks
  • 26. Professionals Red Hat Hackers: • find black hat hackers, intercept and destroy their schemes • Employed by the govt. agencies • can be a free lancer too. Elite Hackers: • the “cutting-edge geniuses”. • the real experts and the innovators in the field of hacking • Legends in their fields • Top of the hacker chain • Sometimes work as consultants
  • 27. Political or Commercial Group • Want to fulfill their agenda • Backed up by higher authority, sometimes Governments • Example: • Israel’s attack on Iran’s Nuclear plant using “STUXNET” State/Nation Sponsored Hackers
  • 29. • Known as “White Hat Hackers” • know how to find and exploit vulnerabilities and weaknesses in systems • uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them • More likely penetration tester • there’s even a professional certification for ethical hackers: the Certified Ethical Hacker (CEH). White Hat (Ethical) Hackers