Cyber Crime
Presented by:
Anurag Singh
Vijay Kumar
Shikher Pandey
Sudhanshu Chand
What is Cyber Crime
All crimes performed or resorted to by abuse of electronic media or
otherwise, with the purpose of influencing the functioning of computer or
computer system.
Cyber Crime is any crime where:
- Computer is the target
- Computer is the tool of crime
- Computer is the incidental to crime
Cybercrime Scenarios
Every customer file was
encrypted automatically
A company’s network was
saturated before the public
announcement of a major
new initiative
Large sums
of money from
Child porn has the bank have
been placed on been transferred
your Web server Wha
t if?
A spy has been
An Insider attacked another found within your
government agency organization
using your agencies
IP address range
A large amount of
encrypted traffic
Senior management was sent to the
computers have been Server
accessed remotely.
Victims of Cyber
Cyber Criminals
Crime
Disgruntled employees. Unskilled &
Teenagers. Inexperienced.
Political Greedy People.
Hackers.
Professional Hackers. Desperate.
Business Rival. Unaware about cyber
crime.
Why Cyber Crime Occurs??
Weakness of the underlying operating
system.
Lack of awareness of user.
Lack of implementation of security
measures.
Increasing new ways of cyber crime.
Types of Cyber Crimes
Hacking
Hacking
Virus
Virus Dissemination
Dissemination
Credit
Credit Card
Card Fraud
Fraud
Phishing
Phishing
Spoofing
Spoofing
Salami
Salami Attack
Attack
Denial
Denial of
of Service
Service
Software
Software Piracy
Piracy Lottery
Lottery Scam
Scam
Hacking
Hacking in simple terms means illegal intrusion into a
computer system without the permission of the
computer owner/user.
A hacker is someone who gains unauthorized access to a
computer system. Many hackers just like the challenge
of breaking through a computer security system but not
all hackers are harmless.
Virus Dissemination
These
These are
are the
the Malicious
Malicious software
software that
that attaches
attaches itself
itself to
to
other
other softwares.
softwares.
Virus,
Virus, Worms,
Worms, Trojan
Trojan Horse,
Horse, Time
Time bomb,
bomb, Logic
Logic Bomb,
Bomb,
Rabbit
Rabbit and
and Bacterium
Bacterium are
are the
the malicious
malicious softwares
softwares
Credit Card Fraud
You simply have to type credit card number
into www page of the vendor for online
transaction.
If electronic transactions are not secured the
credit card numbers can be stolen by the
hackers who can misuse this card by
impersonating the credit card owner
Credit Card
Skimmers
How Credit Card Skimmer is Used
Credit Card Writer
ATM Machine As usual?
False Slot to duplicate your card
A Pamphlet holder at the side does nothing……
But Inside the “Pamphlet Box“ ?????
Micro Camera can see easily the PIN No.
Phishing
It is a technique of Pulling out confidential
information from the bank/financial institution
account holder by deceptive means….
Actual Login form
Phishing e-mail
From **** Bank [mailto: support@****bank.com
Sent: 1 Feb 2008 3:55
To: India
Subject: Official Information from **** Bank
Dear Valued **** Bank customer!
For security purposes your account has been randomly chosen
for verification. To verify your account information we are
asking you to provide us with all the data we are requesting.
Otherwise we will not be verify your identity and access to your
account will be denied. Please click on the link given below to
get to the bank secure page and verify your accounts details.
Thank you.
https://infinity****bank.co.in/verify.isp
**** Bank Ltd.
Deceptive Login Form
Spoofing
Getting one computer
on a network to pretend
to have the identity of
another computer,
usually one with special
access, privileges, so as
to obtain access to the
other computer of the
network
Salami Attack
• In such a crime criminal makes insignificant changes
in such a manner that such changes would go
unnoticed.
• For example criminal make such program that
deducts a small amount like Rs. 2.50 per month from
the account of all the customer of the bank and
deposit the same in his account. In this case no
account holder will approach the bank for such small
account but criminal gain huge amount.
Denial of Service
A denial-of-service attack (DoS attack)
or distributed denial-of-service attack (DDoS
attack) is an attempt to make a computer
resource unavailable to its intended users.
Perpetrators of DoS attacks typically target sites
or services hosted on high-profile web
servers such as banks, credit card payment
gateways etc.
Types of Dos Attacks
Consumption of computational resources, such as
bandwidth, disk space, or processor time.
Disruption of configuration information, such
as routing information.
Disruption of state information, such as unsolicited
resetting of TCP sessions.
Disruption of physical network components.
Obstructing the communication media between the
intended users and the victim so that they can no
longer communicate adequately.
Software Piracy
This is only type of cyber crime in which end user is not
harmed, instead the end user does the crime.
Theft of software occurs through the illegal copying of
genuine programs or the counterfeiting and distribution
of products intended to pass for the original.
High revenue losses worldwide to companies who make
them.
Can be done in various ways-
End user copying, Hard disk loading, Counterfeiting,
illegal downloads from the internet etc.
Lottery Scam
A lottery scam is a type of advance-fee fraud which begins
with an unexpected email notification that "You have won!" a
large sum of money in a lottery.
The recipient of the message — the target of the scam — is
usually told to keep the notice secret, "due to a mix-up in some
of the names and numbers," and to contact a "claims agent.“
After contacting the agent, the target of the scam
will be asked to pay "processing fees" or "transfer
charges" so that the winnings can be distributed,
but will never receive any lottery payment.
Scammer may also ask for pan card or credit card.
How to Protect !
Use anti-virus software and Don't share access to your
firewalls - keep them up to computers with strangers
date If you have a Wi-Fi network,
Keep your operating system password protect it
up to date with critical Disconnect from the Internet
security updates and patches when not in use
Don't open emails or Reevaluate your security on a
attachments from unknown regular basis
sources Make sure your employees
Use hard-to-guess passwords. and family members know
Don’t use words found in a this info too!
dictionary. Remember that
password cracking tools exist.
Don’t go for misleading emails
Type username and password
Remember nothing is free.
by using virtual keyboard.
Back-up your computer data
on disks or CDs often
Thank
you