Cyber Crimes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

The Internet is growing rapidly.

It has given rise to new


opportunities in every field we can think of like entertainment,
business & education.
There're two sides to a coin. Internet also has it's own
disadvantage, i.e. Cyber crime.
 Cybercrime is criminal activity that either targets
or uses a computer, a computer network or a
networked device.
 Most, but not all, cybercrime is committed by
cybercriminals or hackers who want to make
money. Cybercrime is carried out by individuals
or organizations.
 Some cybercriminals are organized,
use advanced techniques and are
highly technically skilled. Others are
novice hackers.
 Rarely, cybercrime aims to damage
 computers for reasons other than profit.
 These could be political or personal.
•In this Tech-savvy world of 21st Century every one is engaged with
internet, through whatsapp, twitter, facebook, net banking & lots of
other platforms are there.
•And some criminal minded persons commit crimes here,which is
included under cybercrime.
•So we should be aware about crimes happening around in the cyber-
space.
 Person or Group who commits Cyber Crime using computers

 Hackers, criminals groups, hacktivists, virus writers, terrorists


Hacking in simple terms means an illegal intrusion or unauthorized
access to or control over a computer system a nd/or network.
•A Denial-of-Service (DoS) attack is
an attack meant to shut down a machine
or network, making it inaccessible to its
intended users. DoS attacks accomplish this
by flooding the target with traffic, or
sending it information that triggers a crash.
•Act by the criminal, who floods the
bandwidth of the victims network or
Internet server is flooded with continuous
requests so as to crash the server
•Its an attempt to make a machine or network
resource unavailable to its intended users
 These are used to make an online service unavailable and take
the network down by overwhelming the site with traffic from
a variety of sources. Large networks of infected devices
known as Botnets are created by depositing malware on
users’ computers. The hacker then hacks into the system
once the network is down.
 This type of attack involves hackers sending malicious email
attachments or URLs to users to gain access to their accounts
or computer. Cybercriminals are becoming more established
and many of these emails are not flagged as spam. Users are
tricked into emails claiming they need to change their
password or update their billing information, giving
criminals access.
 Botnets are networks from compromised computers that are
controlled externally by remote hackers. The remote hackers
then send spam or attack other computers through these
botnets. Botnets can also be used to act as malware and
perform malicious tasks.
 It is an act of getting one computer system or a network to
pretend to have the identity of another computer. It is mostly
used to get access to exclusive privileges enjoyed by that
network or computer.
 Keep software and operating system updated
 Use anti-virus software and keep it updated
 Use strong passwords
 Never open attachments in spam emails
 Do not click on links in spam emails or untrusted websites
 Do not give out personal information unless secure
 Contact companies directly about suspicious requests
 Be mindful of which website URLs you visit
 Keep an eye on your bank statements
 Here, are some most commonly occurring Cybercrimes:
 The fraud did by manipulating computer network
 Unauthorized access to or modification of data or application
 Intellectual property theft that includes software piracy
 Industrial spying and access to or theft of computer materials
 Writing or spreading computer viruses or malware
 Digitally distributing child pornography
 There are many types of Digital forensic tools
1. Kali Linux
 Kali Linux is an open-source software that is maintained and
funded by Offensive Security. It is a specially designed program for
digital forensics and penetration testing.
2. Ophcrack
 This tool is mainly used for cracking the hashes, which are
generated by the same files of windows. It offers a secure GUI
system and allows you to runs on multiple platforms.
3. EnCase
 This software allows an investigator to image and examine data
from hard disks and removable disks.
4. SafeBack
 SafeBack is mainly using for imaging the hard disks of Intel-based
computer systems and restoring these images to some other hard
disks.
5. Data dumper
 This is a command-line computer forensic tool. It is freely
available for the UNIX Operating system, which can make exact
copies of disks suitable for digital forensic analysis.
6. Md5sum
 A tool to check helps you to check data is copied to another
storage successfully or not.
 It will protect your business.
 Please safeguard your personal details.
 Allows employees to work comfortably.
 It preserves efficiency as well.
 This automates various tasks.
 Organize knowledge and data more efficiently.
 The data and files can be processed in important ways.
 This could lead to a privacy breach.
 This can steal, use, and distort your data and confidential
information.
 This can cause a loss of data that can result in a business loss.
 Security threats associated with a large network link.
 Improved hacker speed and ability.
 Increase in cyber-defense.

You might also like