0% found this document useful (0 votes)
120 views30 pages

Cyber Crime Cyber Crime: Presented By: Presented by

Cybercrime can take many forms where computers are the target, tool, or incidental to the crime. Common cybercrimes include hacking, virus dissemination, credit card fraud such as through skimming devices, phishing scams, spoofing, salami attacks which make small changes unnoticed, and denial of service attacks that make websites unavailable. Cybercriminals may be disgruntled employees, hackers enjoying the challenge, or greedy individuals. Victims are often unaware or inexperienced computer users. Protecting against cybercrime requires keeping software and passwords updated, using firewalls and antivirus software, being wary of unsolicited emails, and backing up important data.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views30 pages

Cyber Crime Cyber Crime: Presented By: Presented by

Cybercrime can take many forms where computers are the target, tool, or incidental to the crime. Common cybercrimes include hacking, virus dissemination, credit card fraud such as through skimming devices, phishing scams, spoofing, salami attacks which make small changes unnoticed, and denial of service attacks that make websites unavailable. Cybercriminals may be disgruntled employees, hackers enjoying the challenge, or greedy individuals. Victims are often unaware or inexperienced computer users. Protecting against cybercrime requires keeping software and passwords updated, using firewalls and antivirus software, being wary of unsolicited emails, and backing up important data.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Cyber Crime

Presented by:
Anurag Singh
Vijay Kumar
Shikher Pandey
Sudhanshu Chand
What is Cyber Crime
 All crimes performed or resorted to by abuse of electronic media or
otherwise, with the purpose of influencing the functioning of computer or
computer system.

Cyber Crime is any crime where:


- Computer is the target

- Computer is the tool of crime

- Computer is the incidental to crime


Cybercrime Scenarios
Every customer file was
encrypted automatically
A company’s network was
saturated before the public
announcement of a major
new initiative
Large sums
of money from
Child porn has the bank have
been placed on been transferred
your Web server Wha
t if?
A spy has been
An Insider attacked another found within your
government agency organization
using your agencies
IP address range
A large amount of
encrypted traffic
Senior management was sent to the
computers have been Server
accessed remotely.
Victims of Cyber
Cyber Criminals
Crime

Disgruntled employees. Unskilled &


Teenagers. Inexperienced.
Political Greedy People.
Hackers.
Professional Hackers. Desperate.

Business Rival. Unaware about cyber


crime.
Why Cyber Crime Occurs??

Weakness of the underlying operating


system.
Lack of awareness of user.
Lack of implementation of security
measures.
Increasing new ways of cyber crime.
Types of Cyber Crimes
Hacking
Hacking

Virus
Virus Dissemination
Dissemination

Credit
Credit Card
Card Fraud
Fraud

Phishing
Phishing

Spoofing
Spoofing

Salami
Salami Attack
Attack

Denial
Denial of
of Service
Service

Software
Software Piracy
Piracy Lottery
Lottery Scam
Scam
Hacking
 Hacking in simple terms means illegal intrusion into a
computer system without the permission of the
computer owner/user.
 A hacker is someone who gains unauthorized access to a
computer system. Many hackers just like the challenge
of breaking through a computer security system but not
all hackers are harmless.
Virus Dissemination


 These
These are
are the
the Malicious
Malicious software
software that
that attaches
attaches itself
itself to
to
other
other softwares.
softwares.
 Virus,
 Virus, Worms,
Worms, Trojan
Trojan Horse,
Horse, Time
Time bomb,
bomb, Logic
Logic Bomb,
Bomb,
Rabbit
Rabbit and
and Bacterium
Bacterium are
are the
the malicious
malicious softwares
softwares
Credit Card Fraud
You simply have to type credit card number
into www page of the vendor for online
transaction.
If electronic transactions are not secured the
credit card numbers can be stolen by the
hackers who can misuse this card by
impersonating the credit card owner
Credit Card
Skimmers
How Credit Card Skimmer is Used
Credit Card Writer
ATM Machine As usual?
False Slot to duplicate your card
A Pamphlet holder at the side does nothing……
But Inside the “Pamphlet Box“ ?????
Micro Camera can see easily the PIN No.
Phishing

It is a technique of Pulling out confidential


information from the bank/financial institution
account holder by deceptive means….
Actual Login form
Phishing e-mail

From **** Bank [mailto: support@****bank.com


Sent: 1 Feb 2008 3:55
To: India
Subject: Official Information from **** Bank

Dear Valued **** Bank customer!


For security purposes your account has been randomly chosen
for verification. To verify your account information we are
asking you to provide us with all the data we are requesting.
Otherwise we will not be verify your identity and access to your
account will be denied. Please click on the link given below to
get to the bank secure page and verify your accounts details.
Thank you.

https://infinity****bank.co.in/verify.isp
**** Bank Ltd.
Deceptive Login Form
Spoofing

Getting one computer


on a network to pretend
to have the identity of
another computer,
usually one with special
access, privileges, so as
to obtain access to the
other computer of the
network
Salami Attack

• In such a crime criminal makes insignificant changes


in such a manner that such changes would go
unnoticed.
• For example criminal make such program that
deducts a small amount like Rs. 2.50 per month from
the account of all the customer of the bank and
deposit the same in his account. In this case no
account holder will approach the bank for such small
account but criminal gain huge amount.
Denial of Service

A denial-of-service attack (DoS attack)


or distributed denial-of-service attack (DDoS
attack) is an attempt to make a computer
resource unavailable to its intended users.

 Perpetrators of DoS attacks typically target sites


or services hosted on high-profile web
servers such as banks, credit card payment
gateways etc.
Types of Dos Attacks

 Consumption of computational resources, such as


bandwidth, disk space, or processor time.
 Disruption of configuration information, such
as routing information.
 Disruption of state information, such as unsolicited
resetting of TCP sessions.
 Disruption of physical network components.
 Obstructing the communication media between the
intended users and the victim so that they can no
longer communicate adequately.
Software Piracy
 This is only type of cyber crime in which end user is not
harmed, instead the end user does the crime.
 Theft of software occurs through the illegal copying of
genuine programs or the counterfeiting and distribution
of products intended to pass for the original.
 High revenue losses worldwide to companies who make
them.
 Can be done in various ways-

End user copying, Hard disk loading, Counterfeiting,


illegal downloads from the internet etc.
Lottery Scam

A lottery scam is a type of advance-fee fraud which begins


with an unexpected email notification that "You have won!" a
large sum of money in a lottery.
The recipient of the message — the target of the scam — is
usually told to keep the notice secret, "due to a mix-up in some
of the names and numbers," and to contact a "claims agent.“
 After contacting the agent, the target of the scam
will be asked to pay "processing fees" or "transfer
charges" so that the winnings can be distributed,
but will never receive any lottery payment.
Scammer may also ask for pan card or credit card.
How to Protect !
 Use anti-virus software and  Don't share access to your
firewalls - keep them up to computers with strangers
date  If you have a Wi-Fi network,
 Keep your operating system password protect it
up to date with critical  Disconnect from the Internet
security updates and patches when not in use
 Don't open emails or  Reevaluate your security on a
attachments from unknown regular basis
sources  Make sure your employees
 Use hard-to-guess passwords. and family members know
Don’t use words found in a this info too!
dictionary. Remember that
password cracking tools exist.
 Don’t go for misleading emails
 Type username and password
 Remember nothing is free.
by using virtual keyboard.
 Back-up your computer data
on disks or CDs often
Thank
you

You might also like