Transcript

Cyber Crime - Prime College

Presenter’s Profile

Hem Sagar Pokhrel

MSP 2013

Prime College

Volunteer, Youth Action Nepal

Anamnagar, Kathmandu-Nepal

@NepaliSagar

www.facebook.com/

geeksagar

WHAT IS CYBER CRIME ?

Computer crime or cybercrime is a

form of crime where the Internet or

computers are used as a medium to

commit crime.

National Research Council,

"Computers at Risk",

1991.

"The modern thief can steal more with

a computer than with a gun.

Tomorrow's terrorist may be able to do

more damage with a keyboard than

with a bomb".

TYPES OF CYBER CRIME

1. Cybercrimes against

persons.

2. Cybercrimes against

property.

3. Cybercrimes against

government.

1.AGAINST PERSON

Includes various harassment of anyone

with the use of a computer such as e-

mail.

E.g.:- The Melissa virus first appeared on the internet

in March of 1999. It spread rapidly throughout

computer systems in the United States and Europe. It

is estimated that the virus caused 80 million dollars in

damages to computers worldwide.

AGAINST PERSON contd..

oCyber harassment is a distinct Cybercrime.

oHarassment can be sexual, racial, religious, or other.

Persons perpetuating such harassment are also guilty

of cybercrimes.

oCyber harassment as a crime also brings us to

another related area of violation of privacy of citizens.

oNo one likes any other person invading the

invaluable and extremely touchy area of his or her

own privacy which the medium of internet grants to

the citizen.

2.AGAINST PROPERTY

Include computer vandalism (destruction of others' property), transmission of harmful programmes.

E.g. : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.

3.AGAINST GOVERNMENT

An individual "cracks" into a

government or military maintained

website or systems.

This crime manifests itself into

terrorism .

E.g. Group like LUZSEC Anonymous

Why learn about CYBER CRIME ?

Everybody is using COMPUTERS.

New generation is growing up with computers

Terrorist targeted the teenagers.

Conventional crimes like Forgery,, extortion,,

kidnapping are being committed with the help

of computers.

MOST IMPORTANT - Monetary transactions

are moving on to the INTERNET

IN SHORT

Cyber CRIME is any

crime where Computer is

a target. Computer is a tool of

crime Computer is incidental

to crime

VICTIMS

Desperados and greedy

people

Unskilled &

Inexperienced

Unlucky people

Hacker and Cracker

A Hacker is a person who just wants to know the

inner workings of computer systems, helping to

improve them if they detect flaws in their security. 

A Cracker is a person with high skills in computer

systems (the same way that hackers), these skills are

regularly used for personal benefit or for harm.

HACKING Illegal intrusion into a computer system without

the permission of the computer owner/user.

Types1. Ethical hacking &2. Non- ethical hacking

VIRUS DISSEMINATION

Malicious software that

attaches itself to other

software.e.g.:-1. Virus, worms, 2. Trojan Horse, 3. Time bomb,4. Logic Bomb,

SOFTWARE PRIVACY

Theft of software through the illegal copying

of genuine programs or the counterfeiting

and distribution of products intended to pass

for the original.

Retail revenue losses worldwide are ever

increasing due to this crime Can be done in

various ways

E.g.:-End user copying, Hard disk loading,

Counterfeiting,

Illegal downloads from the internet etc.

INTERNET RELAY CHAT

Internet Relay Chat (IRC) servers have chat

rooms in which people from anywhere the

world can come together and chat with each

other.

Criminals use it for meeting co-conspirators.

Hackers use it for discussing their exploits /

sharing the techniques.

DDOS ATTACK

malicious action typically taken against a

computer system such as a server or

webpage host.  Server Flooding is achieved by causing a

server to attempt to respond to an excessive number of users simultaneously

Server crashing is typically achieved through a malicious piece of software that uses a flaw or weakness in the server programming to cause the server to crash and be inaccessible until restarted.

Email Bombing

Form of denial of service attack that floods

an inbox and mail server with messages.

This type of attack can be a nuisance on a

low level, but it can also become a serious

problem. 

There are a variety of techniques that can be

used to address email bombing. Maintaining -multiple email addresses for different activities can help.

NET EXTORTION

Copying the company’s

confidential data in order to

extort paid company for huge

amount.

CYBER DEFAMATION

The Criminal sends emails containing

defamatory matters to all concerned off the

victim or post the defamatory matters on a

website..

E.g.:-(disgruntled employee may do this

against boss,, ex-boys friend against girl,,

divorced husband against wife etc.)

PHISHING

It is technique of pulling out

confidential information from

the bank/financial

institutional account holders

by deceptive means.

PHISHINGIt is technique of pulling out confidential

information from the bank/financial institutional

account holders by deceptive means.

PHISHINGIt is technique of pulling out confidential

information from the bank/financial institutional

account holders by deceptive means.

How to be secure then .???

1. Enabled the “Always use HTTPS” setting for

Facebook, Twitter, Outlook, Gmail, Google and all the

other online services.

2. Offers via an unknown person or offers that are too good

to be true should be suspect.  

3. Don’t click the links in emails. Always go to the

source or manually type in the address in your web

browser.

4. Don’t use a debit card online. If your debit card is

compromised that’s money out of your bank account.

Credit cards provide more protection and less liability.

How to be secure then .???

5. Secure your PC. Update your critical security patches

and anti-virus and only shop from a secured Internet

connection.

6. Change your password often and use combination

of Uppercase, Lowercase, Special characters and

characters as password. 

CYBER CRIME AND

SOCIAL MEDIA

Do take advantage of privacy settings and

encourage your friends to do the same

Do ask questions before clicking a link.

Do accept friend requests with caution. D

Don’t include too much identifying information.

Don’t automatically trust everyone.

Facebook Security

Stay Updated

Secure Web Hosts

Moderate the comment

Backups

Twitter Security

Never share personal

information

Don’t be too specific

Link your twitter account

Don’t spit excessive personal

information, this is about as

dangerous on any other social

network. if necessary.

Twitter Security Don’t tweet about moving

servers, changing passwords or any other type of situation where your security could be compromised more easily.

Review applications that use your twitter account with other networking sites like Facebook only

 

•Stay Updated

•Secure Web Hosts

•Moderate the comment

•Backups

How To Secure Your Blog

 

Malware bytes' Anti-

Malware

True Crypt

CCleaner

Flash Cookie Remover

Offline Protection

Security Tips | Smartphone Users

Install anti-virus software, and keep it

updated.

Use a PIN code or pattern lock on your phone.

Turn off geo-tagging, or turn off photo auto-

uploads.

Avoid location "check-ins.“

Don't store passwords on the phone.

Enable remote 'wiping' of data.

Encrypt public Wi-Fi transmissions.

Our Expectation Now Onwards

Conscious about Electronic Transaction act 2064

Don't edit images in unwanted manner and also do

not like, share ,tag and post such edited images in

any Social Networking sites.

Do not keep multi accounts of same sites | delete if

you already have.

Use privacy setting to avoid cyber theft.

Hide your Geographical Location as far as

practicable.

References

facebook.com/security

fass10012041.wordpress.com

forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-

DNS

en.wikipedia.org/wiki/

f-secure.com/weblog/

totaldefense.com/securityblog.aspx

twitter.com/safety

THANK YOU

top related