Module 1 A
Module 1 A
Security/Crime
Importance of Cyber
Security
.
Banking Options
Cyber Crime
What is Cyber Crime?
Criminal Activity
No great differences
Only differenceis the medium through which
crime is committed
Knives and weapons vs port scanners, viruses, and
worm to gain access
Against groups or individuals
Intention is embezzlement of money or something of
value
Physical presence of criminal at the site of crime is
not must
What are Cyber Crime Threats
Traditional criminals
Fraudsters and thieves
Hackers and computer tress passers, password
hackers
Malicious code writers and distributors
Music, movie and software pirates
Harassers and extortionists
Stalkers, pedophiles and other cyber sex
offenders
Academic cheats
Organised criminals including ethnic based
gangs
Corporate, government and free lance spies
Cyber terrorists
How Cyber Criminals
Work
Very professional and organized
Not spontaneous – ground work necessary
Coders
Kids
Drops
Mobs
Classification of Cyber Crimes
• E-mail Spamming
Spam is a message also called as junk
mail; send with a web link or business proposal.
Clicking on this link or replying to commercial offer send to a
phishing website or set up a malware in your workstation.
Crime against Individual
Cyber Defamation
Act of imputing any individual with intention to lower the person
in the estimation of the right-thinking members of society
generally or to cause him to be ignored or sidestepped or to
rendering him to hate, disrespect or ridicule.
Cyber Stalking
stalking is "pursuing stealthily”
following a person's movements across the Internet by posting
messages (sometimes threatening) on the bulletin boards
frequented by the victim, entering the chat-rooms visited by
the victim, continually attacking the victim with emails, etc.
Crime against Property
• Web Jacking
The word ‘Web Jacking’ comes from Hijacking. In this type of cyber-
crime, the cybercriminals hacks the control of a website. They may
able to change the content of that website. They use that website
as owner and the real owner of website has no more control on the
website. Sometime attackers ask for ransom to the owner of the
website.
Types of Cyber Crimes
• Financial Crime
• Fraud and cheating
• Information theft
• Cyber extortion
• Drug trafficking
• Weapons and illegal goods/activities
• Harassment
• Cyber stalking
• Dissemination of obscene or offensive
content
• Defamation
Types of Cyber Crimes
• Cyber terrorism
• Cyber warfare
• Denial of service
• Intellectual property theft
• Computer vandalism
Techniques of Cyber
Crimes
• Dumpster diving – Treasure in trash
• Wire tapping – penetrate telecom networks
• Eavesdropping on emanations – pick up data from signals
• Denial of service – load a computer with numerous requests
• Phishing / Masquerading – use a mail message to look like a real
site
• Data attacks -
• Unauthorised copying of data
• Trap doors
• Traffic analysis
• Harassment
• Software piracy
• Session hijacking
Risk
• Management
Process of identifying critical information assets, assessing
the risks, threats and vulnerabilities that these assets
face, estimating the impact of these risks and launching
countermeasures
• Countermeasures:-
• Accepting the risk
• Transferring the risk
• Avoiding the risk
• Applying control
Security
Controls
• Specify, design, implement, operate and maintain security
controls
• Security Managemnent Framework – ISO/IEC 27002
• Cryptography
• Encryption
Thank
s