Cyber Crime
-
Upload
md-rafid-abrar-miah-tishad -
Category
Internet
-
view
17 -
download
1
Transcript of Cyber Crime
ABRAR 1
CYBER CRIME
ABRAR 2
WHY WE SHOULD KNOW ABOUT CYBER CRIME
• IN THIS TECH SAVVY WORLD OF 21ST CENTURY, EVERYONE IS ENGAGED WITH INTERNET, THROUGH WHATSAPP, TWITTER, FACEBOOK, NET-BANKING & LOTS OF OTHER PLATFORMS ARE THERE.
• AND SOME CRIMINAL MINDED PERSONS COMMIT CRIMES HERE, WHICH IS INCLUDED UNDER CYBER CRIME.
• SO WE SHOULD BE AWARE ABOUT CRIMES HAPPENING AROUND THE CYBER SPACE.
ABRAR 3
DEFINITION OF CYBER CRIME
• A CYBER CRIME IS AN UNLAWFUL ACT WHEREIN THE COMPUTER IS EITHER A TOOL OR A TARGET OR BOTH.
• ACTS THAT ARE PUNISHABLE BY THE INFORMATION TECHNOLOGY ACT.
• CYBER SPACE IS A VIRTUAL SPACE THAT HAS BECOME AS IMPORTANT AS REAL SPACE FOR BUSINESS, POLITICS, AND COMMUNITIES .
ABRAR 4
HISTORY OF CYBER CRIME
• THE FIRST RECORDED CYBER CRIME TOOK PLACE IN THE YEAR 1820!
• BUT THE FIRST MAJOR CYBER CRIMES CAME INTO BEING IN THE 1960S WHEN A GROUP OF HACKERS EMERGED FROM MASSACHUSETTS INSTITUTE OF TECHNOLOGY (MIT)
• THE FIRST VIRUS CAME INTO BEING IN 1981. IT WAS CREATED ON THE APPLE II OPERATING SOFTWARE AND WAS SPREAD THROUGH FLOPPY DISK, CONTAINING THE OPERATING SOFTWARE.
ABRAR 5
CATEGORIES OF CYBER CRIME
• CYBER CRIMES CAN BE BASICALLY DIVIDED INTO 3 MAJOR CATEGORIES:
1. CYBER CRIMES AGAINST PERSONS.
2. CYBER CRIMES AGAINST PROPERTY.
3. CYBER CRIMES AGAINST GOVERNMENT
ABRAR 6
Cyber Crime
Hacking Malware
Virus & WormsDenial of Service Attacks
SpamComputer Vandalism
Obscene ContentFraud
Software PiracyHarassment
Cyber Stalking Trafficking
ABRAR 7
TYPES OF CYBER CRIME
• HACKING• HACKING IS UNAUTHORIZED ACCESS OVER A COMPUTER SYSTEM,
AND IT USUALLY INVOLVES MODIFYING COMPUTER HARDWARE OR SOFTWARE TO ACCOMPLISH A GOAL OUTSIDE THE CREATOR’S PURPOSE.
• MALWARE• MALWARE MEANS MALICIOUS SOFTWARE. IT IS DESIGNED TO
SECRETLY ACCESS AND INDIVIDUALS COMPUTER WITHOUT HIS OR HER PERMISSION.
• MOST MALWARE ARE SOFTWARE’S CREATION TO STEAL DATA.
ABRAR 8
TYPES OF CYBER CRIME
• VIRUS AND WORMS – • VIRUSES ARE PROGRAMS THAT ATTACH THEMSELVES TO A COMPUTER OR A FILE TO
CIRCULATE THEMSELVES TO COMPUTER OR NETWORK. THEY REQUIRES HOST
• WORMS MERELY MAKE FUNCTIONAL COPIES OF THEMSELVES AND DO THIS REPEATEDLY TILL THEY EAT UP ALL THE AVAILABLE SPACE ON A COMPUTERS MEMORY. THEY DON’T REQUIRES HOST
• DENIAL OF SERVICE ATTACKS -
• IT BASICALLY USED FOR MAKE A WEBSITE DISABLE FOR A SHORT OR LONG TIME.
• IT IS NATURALLY APPLIED AGAINST ANY ORGANIZATION TO STOP THEIR VIRTUAL ACTIVITIES.
ABRAR 9
TYPES OF CYBER CRIME
SPAM– THE UNWANTED SENDING OF BULK E-MAIL FOR COMMERCIAL PURPOSES IS CALLED SPAM WHICH IS A MINOR CRIME. LAWS HAVE CROPPED ALREADY TO PREVENT THIS.
ABRAR 10
TYPES OF CYBER CRIME
• COMPUTER VANDALISM• IT MEANS DELIBERATE DESTROYING OR DAMAGING PROPERTY OF
ANOTHER WHICH MAY TAKE THE FORMS OF • THEFT AND• PHYSICAL DAMAGE.
• HARASSMENT• ANY VIRTUAL COMMENT THAT MAYBE CONSIDERED OFFENSIVE IS
CONSIDERED HARASSMENT WHICH MAY TAKE PLACE VIA INTERNET • IN CHAT ROOMS• SOCIAL NETWORKING SITES AND • EMAILS.
ABRAR 11
TYPES OF CYBER CRIME• OBSCENE CONTENT• INCLUDE CONTENTS OF WEBSITE THAT MAY BE
DISTASTEFUL, OBSCENE OR OFFENSIVE IN MANY WAYS. CHILD PORNOGRAPHY IS ONE O THE MAJOR VICTIMS OF THIS.
• CHILD PORNOGRAPHY INCLUDES SEXUAL IMAGES INVOLVING CHILDREN UNDER PUBERTY, PUBERTY AND POST PUBERTY.
• ACCORDING TO “THE WEEK”-• 10 MILLION UNIQUE IP ADDRESS SHARING CHILD PORNOGRAPHY IN
US (2009)• SHARING OF CHILD PORNOGRAPHY BECOME 4 TIMES HIGHER FROM
2007 TO 2011
ABRAR 12
TYPES OF CYBER CRIME• SOFTWARE PIRACY
• UNAUTHORIZED COPYING OF PURCHASED SOFTWARE IS CALLED SOFTWARE PIRACY WHICH IS COMPLETELY ILLEGAL.
• HOWEVER SOFTWARE IS STILL RAMPANT AND IS ALMOST IMPOSSIBLE TO PUT A TOP TO IT.
• PERCENTAGE OF SOFTWARE PIRACY IN• USA – 20%
• LUXEMBOURG – 21%• NEW ZEALAND – 22%• AZERBAIJAN - 92%• BANGLADESH – 92%• ARMENIA – 93%
ABRAR 13
TYPES OF CYBER CRIME
• FRAUD• ONLINE FRAUD & CHEATING IS ONE OF THE MOST LUCRATIVE
BUSINESSES THAT ARE GROWING TODAY IN THE CYBER SPACE.• SOME OF THE CASES OF ONLINE FRAUD AND CHEATING THAT HAVE
COME TO LIGHT ARE THOSE RELATING TO • CREDIT CARD CRIMES• BANK FRAUD• CONTRACTUAL CRIMES• INTERNET SCAMS• IDENTITY THEFT• EXTORTION ETC
ABRAR 14
GLOBAL STATE OF CYBER CRIME THE MAJORITY OF CYBERCRIMES ARE CENTERED ON FORGERY, FRAUD
AND PHISHING, INDIA IS THE THIRD-MOST TARGETED COUNTRY FOR PHISHING ATTACKS
AFTER THE US AND THE UK, SOCIAL NETWORKS AS WELL AS ECOMMERCE SITES ARE MAJOR TARGETS, 6.9 MILLION BOT-INFECTED SYSTEMS IN 2010, 14,348 WEBSITE DEFACEMENTS IN 2010, 6,850 .IN AND 4,150 .COM DOMAINS WERE DEFACED DURING 2011, 15,000 SITES HACKED IN 2011, INDIA IS THE NUMBER 1 COUNTRY IN THE WORLD FOR GENERATING
SPAM.
ABRAR 15
CYBER CRIME IN BANGLADESH
ABRAR 16
SUMMARYIN 2005, AMONG 7,818 BUSINESSES –
• 67% DETECTED AT LEAST ONE CYBERCRIME AND NEARLY 60% DETECTED ONE OR MORE TYPES OF CYBER ATTACK.
• 11% DETECTED CYBER THEFT AND 24% DETECTED OTHER COMPUTER SECURITY INCIDENTS.
• THE MAJORITY OF VICTIMIZED BUSINESSES (86%) DETECTED MULTIPLE INCIDENTS, WITH HALF OF THESE (43%) DETECTING 10 OR MORE INCIDENTS DURING THE YEAR.
ABRAR 17
SUMMARYIN 2005, AMONG 7,818 BUSINESSES –
• APPROXIMATELY 68% OF THE VICTIMS OF CYBER THEFT SUSTAINED MONETARY LOSS OF $10,000 OR MORE.
• BY COMPARISON, 34% OF THE BUSINESSES DETECTING CYBER ATTACKS AND 31% OF BUSINESSES DETECTING OTHER COMPUTER SECURITY INCIDENTS LOST MORE THAN $10,000.
• SYSTEM DOWNTIME LASTED BETWEEN 1 AND 24 HOURS FOR HALF OF THE BUSINESSES AND MORE THAN 24 HOURS FOR A THIRD OF BUSINESSES DETECTING CYBER ATTACKS OR OTHER COMPUTER SECURITY INCIDENTS.
BUT…MOST BUSINESSES DID NOT REPORT CYBER ATTACKS TO
LAW ENFORCEMENT AUTHORITIES.
ABRAR 18
BANGLADESH BANK INCIDENT
HACKERS BEHIND $81 MILLION CYBER HEIST – ONE OF THE WORLD'S BIGGEST EVER – FROM BANGLADESH BANK WILL NEVER
BE CAUGHT AS THEY ARE 'UNTRACEABLE'
• IN FEBRUARY $81MILLION (£55MILLION) VANISHED FROM BANGLADESH CENTRAL BANK
• THE MONEY WAS TRANSFERRED TO BANK ACCOUNTS IN MANILA, PHILIPPINES• MUCH OF IT WAS THEN LAUNDERED AT CASINOS IN MANILA• THE GANG HAD TRIED TO MAKE 35 MONEY TRANSFERS, WORTH $951MILLION
(£651MILLION) • A SOURCE HAS TOLD MAIL ONLINE THE REAL 'MASTERMINDS' ARE BASED IN INDIA
ABRAR 19
PREVENTION• DISABLE AND LOG OFF A SPECIFIC USER ACCOUNT
TO PREVENT ACCESS. • DISABLE AND LOG OFF A GROUP OF USER
ACCOUNTS WHICH ACCESS A PARTICULAR SERVICE THAT IS BEING ATTACKED.
• DISABLE AND DISMOUNT SPECIFIC (NETWORK) DEVICES, FOR INSTANCE DISK DEVICES THAT ARE BEING SWAMPED.
• DISABLE SPECIFIC APPLICATIONS, FOR EXAMPLE, AN E-MAIL SYSTEM SUBJECTED TO A SPAM ATTACK.
• CLOSE DOWN AN ENTIRE SYSTEM, AND DIVERT PROCESSING TO AN ALTERNATIVE OR BACKUP SERVICE ON A SECONDARY NETWORK.
ABRAR 20
ABRAR 21THANK YOU