CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

28

Transcript of CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Index• Introduction

• Classification of cyber crimes

• Fraud and Financial crimes

• Obscene or offensive content

• Harassment

• Online shopping fraud

• Drug trafficking

• Cyber terrorism

• Cyber warfare

• Cyber Crime variants

• Top 10 Cyber Crime Prevention Tips

• Threats

• Conclusion

Introduction:-

• Definition

• Commission of a crime

• Internet and mobile phones

• Threaten to nation’s security and financial health.

• Problems of when there is no evidence

Types of cyber crime:-

• Crimes that target computers directly

• Crimes facilitated by computer networks or devices

Cause of cyber crime:-

Computer viruses

Denial-of-service attack

Malware (malicious code)

Spam

Computer networks or devices to advance other ends include:-

Cyber stalking

Fraud and identity theft

Information warfare

Phishing scams

Fraud and Financial Crimes:-

• Entering False information

•Destroying data

• Scams target consumers

Obscene or offensive content:-

• Communications may be illegal.

• Unlawful varies greatly between countries, and even within nations.

• It is a sensitive area

• Internet pornography

• Altering in an unauthorized way

Harassment:-

• Definition

• Source

• Involvement of a computer

• Example

• Passing Laws to ban cyber crime

• Why harassment occurs over the internet.

• Bullying over the internet may occur for no reason.

Threat’s

• Definition:-

• Various address changement

• Various attacks

Drug trafficking:-

• Internet promotes drug trafficking

• From where drug trafficking evolved

• Lack of face to face communication

• Platform for illegal drugs purchase .

Cyber terrorism:-

• Definition

• Increase in Internet problems and server scans since early 2001.

• Groups to map potential security holes in critical systems.

• How cyber terrorist works ?

• Cyber extortion is a form of cyber terrorism

Cyber Crime variants:-

Cyber stalking:-

• Use of the Internet

• Online harassment and online abuse

• Harassing or threatening

Hacking:-

• Cracking systems

• Gaining unauthorized access

• 37 per cent increase this year

Phishing:-

• Fooling people

•Unsolicited emails

• Fraudulent replica

• Access to the customer's online bank account

• F-Secure Corporation's summary of 'data security’

Cross site scripting:-

• Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.

• Examples of such code include HTML code and client-side scripts.

• An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls.

Vishing:-

•What is Vishing ?

• The victim is often unaware about VoIP

• Aim of vishing

Bot Networks:-

• Remotely take control of computers without the users realizing it

• Download malicious codes

• Zombies can for vulneracli

• increase the speed and breadth of their attacks.

• Backdoor

• Problems for organizations

Documented cases:-

• Posting passwords online.

• Stealing credit card information.

• Hacking military's web site.

• Melissa worm.

• Mafia boy

Combating Computer Crime:-

• Source of evidence.

• Records.

• Login for predetermined amount of time.

Cyber Crime Prevention Technique:-

Use Strong Passwords

Secure your computer

Be Social-Media Savvy

Secure your Mobile Device

Install the latest operating system updates

Protect your Data

Secure your wireless network

Protect your e-identity

Avoid being scammed

Call the right person for help

Online Shopping Fraud:-

•What is Online Shopping Fraud.

•What is Online Auction Fraud.

•How to protect your self.

Tips to avoid cyber crime:-

• Unsolicited emails

• Infected attachments

• Restricted Sharing of files & Personal information

• Don’t use Free software

• Use Anti-virus & turn on Firewall

• Use Strong Password

Conclusion:-

•Growing IT sector in country.

•How to reduce cyber theft’s ?

• Precautions to avoid cyber attacks.

Future about Cyber Crime:-

• Smart is the KEY for all home appliance’s

•Drawbacks of advanced techniques

•Hacking your car

•Unauthorized Cloud access

•Digital Kidnapping

•Thank you…..

•Any queries..????

-:SUBMITTED BY:-

KRISHNAKANT MISHRA