Download - Cyber Crime
![Page 1: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/1.jpg)
An overview of differentCyber Attacks
Cyber Crime
![Page 2: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/2.jpg)
Learning Goal’s
• Demystifying Cyber Crime.
• Common Scenarios in Cyber Crime.
• Cyber Crime in India.
• Cyber Attacks.
• Cyber Laws in India.
• Securing Yourself – Do’s and Don’ts
• DCS – Doubt Clearing Session.
• Salutations.
![Page 3: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/3.jpg)
DEMYSTIFYING CYBER CRIME
![Page 4: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/4.jpg)
Cyber Crime
• “Crimes are not to be measured by the issue of events, but by the bad intensions of men.”
• “The greatest crimes donot arise from a want offeeling for others but froman over sensibility forourselves and anover indulgence in our owndesires.”
![Page 5: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/5.jpg)
What is Cyber Crime ?
• Cyber Crime is a term used to broadly describe criminal activity inwhich computers or computer networks are a tool, a target, or aplace of criminal activity and include everything from electroniccracking to denial of service attacks. It is also used to includetraditional crimes in which computers or networks are used to
enable the illicit activity.
• Computer crime mainly consists of unauthorized access to computersystems data alteration, data destruction, theft of intellectualproperty.
• Cyber crime in the context of national security may involve hacking,traditional espionage, or information warfare and related activities.
![Page 6: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/6.jpg)
Unauthorized access: This occurs when a user/hacker
deliberately gets access into someone else’s network either
to monitor or data destruction purposes
Denial of service attack: It involves sending of
disproportionate demands or data to the victims server
beyond the limit that the server is capable to handle and
hence causes the server to crash
Virus, Worms and Trojan attacks: Viruses are basically
programs that are attached to a file which then gets
circulated to other files and gradually to other computers in
the network.
Worms unlike Viruses do not need a host for attachments
they make copies of themselves and do this repeatedly
hence eating up all the memory of the computer.
Trojans are unauthorized programs which functions from
inside what seems to be an authorized program, thereby
concealing what it is actually doing.
Common scenarios in Cyber Crime
![Page 7: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/7.jpg)
Cyber Crimes in India
The major Cyber Crimes reported, in India,
are Denial of Services, Defacement of Websites, Spam, Computer
Virus and Worms, Pornography, Cyber Squatting, Cyber
Stalking and Phishing.
![Page 8: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/8.jpg)
India stands 11th in the ranking for Cyber Crime in the World,constituting 3% of the Global Cyber Crime.
Cyber Crime in India : Statistics
![Page 9: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/9.jpg)
Why India ?
A rapidly growing online user base
121 Million Internet Users
65 Million Active Internet Users, up by 28% from 51 million in 2010
50 Million users shop online on Ecommerce and Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial 2011
![Page 10: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/10.jpg)
The majority of cybercrimes are centered on forgery, fraud and Phishing,
India is the third-most targeted country for Phishing attacks after the US and the UK,
Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
Cyber Crime In India
Wednesday, 25 February 2015
![Page 11: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/11.jpg)
Cyber Crime in India
A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively
![Page 12: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/12.jpg)
CYBER ATTACKS
Think before you Click
![Page 13: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/13.jpg)
Nigerian 419 Fraud Scheme
• It is a type of Confidence trick or using SE (Social Engineering)
• The term “419 “ comes from the Section of the Nigerian Penal Code.
• Persuade someone to give out a sum of money using scam or false promises.
• Methods :-
– False Company Job Scam.
– Online Buy/Sell Goods
– Online Dating Services.
![Page 14: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/14.jpg)
Packet Sniffing
• Packet Sniffing is a method of tapping each packet as it flows across the networks.
• User sniffs data belonging to other users in the network.
• Packet Sniffers can be used as a hacking tool.
• Network Sniffers can capture passwords and other sensitive information through the network.
• Tools of Packet Sniffing : Wireshark, tcpdump, Ettercap etc.
![Page 15: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/15.jpg)
Phishing & Spoofing Attacks
• ‘Spoof’ word came into existence from a game invented by Arthur Roberts in 19th century.
• Spoofing means personating as some other authorized vendor to trick
users into believing a system
as legitimate.
• Types –
– Email Spoofing
– IP-Spoofing
– DNS-Spoofing
![Page 16: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/16.jpg)
..contd.
• Spoofing attacks used to trick people into revealing confidential data is Phishing.
• “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” --- Wikipedia
![Page 17: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/17.jpg)
..contd.
• IP spoofing can be accomplished using proxy servers and simple PHP scripts that are readily and freely available.
• Email spoofing is where spammers try to trick spam filters by making spam look like it comes from a legitimate address. They do this by manipulating the email header to display your email in the “from” address, hence why you get bounces back and others believe the junk mail is coming from you.
![Page 18: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/18.jpg)
DNS Spoofing
• DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer).
![Page 19: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/19.jpg)
Piggy Backing
• Access Wireless connection authorized to another individual without rightful permission.
• It is used as a means to hide illegal activities like identity theft, pornography etc.
• Piggybacking != Wardriving
• Wardrivers collect info about unsecured wi-fi access while driving in a vehicle. It involves logging and mapping of access points.
![Page 20: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/20.jpg)
Software Piracy
• Software Piracy is the illegal distribution, unauthorized reproduction of software for business or personal use.
• Its Illegal and Punishable by law.
• Huge impact on global economy.
• In 2007, IT Industry suffered a loss of $39.6 Billion
Anti- copyright infringement organizations
1. Business Software Alliance (BSA)
2. Canadian Alliance Against Software Theft (CAAST)
3. Federation Against Software Theft (FAST) and more …
![Page 21: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/21.jpg)
Pod Slurping
• An act of using a portable data storage device to facilitate data theft.
• Increasing Security risk.
• Stores malicious code or program that steal credentials or other personalized data.
![Page 22: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/22.jpg)
Source Code Poisoning
• Embed Malicious Code in chunks in a Software’s code.
• Software’s can be trojanized.
• Can be done by developers or testers or contributors.
• Prevention is achievable with proper design of Compilers.
![Page 23: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/23.jpg)
CYBER LAWS IN INDIA
![Page 24: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/24.jpg)
Cyber Laws in India
• The Information Technology Act, 2000
• The Information Technology Amendment Act, 2008
Section 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both”
![Page 25: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/25.jpg)
SECURING YOURSELF DO’S & DON’TS
![Page 26: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/26.jpg)
DO’s
• Install and use a firewall, pop-up blockers and spyware detectors.
• Use an up-to-date Anti Virus.
• Create backups of important files and folders
• Use Strong Passwords.
• Encrypt the Network traffic. (Use a Paid VPN)
• Change Passwords after some interval.
• Do not store passwords or bank logins in your OS.
• Clear Spams regularly.
Etc. etc.
![Page 27: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/27.jpg)
Don’ts
• Give unnecessary details about your being and current living status.
• Hand over your credit card to any person.
• Auto Connect to Open Wi-fi
• Save Passwords in web browsers.
• Open Emails if not sure about it.
• Open email Attachments with unsatisfactory details.
![Page 28: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/28.jpg)
QUESTIONS ? DOUBTS ?
![Page 29: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032420/55a5f3901a28abd53d8b47bc/html5/thumbnails/29.jpg)
THANK YOU