Top Banner
CYBERCRIME IN A NUTSHELL: Social Perspective By A.Shahgholi & H.barzegar
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Crime in a  nutshell

CYBERCRIME IN A NUTSHELL: Social Perspective

By A.Shahgholi & H.barzegar

Page 2: Cyber Crime in a  nutshell

Introduction

Page 3: Cyber Crime in a  nutshell

E-Commerce Network - Suzanne Mello - Nov 5 2004

In the News…….• 1 out of 5 children received a sexual

solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com)

• California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service)

• Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com)

Page 4: Cyber Crime in a  nutshell
Page 5: Cyber Crime in a  nutshell

Cybercrime in General

• What is cybercrime? • When did it all start?• Who is involved? • Why do they do it?

Pre-2000cybercrime Post-2000 cybercrime

Page 6: Cyber Crime in a  nutshell

• There are two main categories of cyber crime.

1. The first type targets computer devices or computer networks directly.

2. The second type targets independent computer devices or computer networks, but are facilitated by computer devices or computer networks

• there are two separate and distinct elements to cybercrime.

1. On the one hand you have an element of exploiting weaknesses in the computer operating system or computer network.

2. On the other hand you have an element of exploiting social fabric of a computer network, whereby a criminal makes use of the computer network to infiltrate the trust of other users of that computer network for profit or gain.

Page 7: Cyber Crime in a  nutshell

Cyber security and Cybercrime

• In particular, this includes the adoption of appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect the integrity of national critical infrastructures.

• At the national level, this is a shared responsibility requiring coordinated action related to the prevention, preparation, response, and recovery from incidents on the part of government authorities, the private sector and citizens.

Page 8: Cyber Crime in a  nutshell

What are general reasons, for hacking, by cyber-criminals?

• Gathering Trophies (quest to become famous)

• General Mischief• Financial Gain• Revenge• Protest• Criminal activity • Identity Theft• Forging Documents

and Message.

Page 9: Cyber Crime in a  nutshell

Top 10 Cyber Security Threats of 2011 and Beyond

1. Attacks via USB2. Large-scale targeted botnet attacks3. Ddos attacks4. Increased attacks on and via social

networks5. Click jacking and cross-site scripting6. Phishing attacks from `trusted` third

party7. Online fraud and money mules8. Cloud computing concerns9. Data exfiltration and insider threats10. Attacks on mobile device and wireless

network

Page 10: Cyber Crime in a  nutshell

Top ten cyber crime skills in high demand

• 1.Coders/programmers• 2. Distributors• 3.Tech experts• 4. Hackers• 5. Fraudsters• 6. Hosted systems

providers• 7. Cashiers• 8. Money mules• 9.Tellers• 10. Organization Leaders

http://www.esetindia.com

Page 11: Cyber Crime in a  nutshell
Page 12: Cyber Crime in a  nutshell

Cybercrime effects

• Effects of cyber crime Cyber Fear In Teenager:

• These days a worst fear in teenagers eyes is Cyber Bullying

• Cyber crime against woman in India:

Cyber crime is a global phenomenon.

1. Harassment via e-mail2. cyber stalking,3. Cyber pornography4. defamation5. morphing6. e-mail spoofing

Complainant Demographic by Age

Page 13: Cyber Crime in a  nutshell

Cyber crime versus India

• . At the same time, India ranks fifth in the world for cyber crime, according to a report last year by the U.S.-based Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center.

• Even under the IT Act, investigations in India are not easy.

• This is mainly due to the lack of what is called “cyber forensics.”

Page 14: Cyber Crime in a  nutshell
Page 15: Cyber Crime in a  nutshell

E-Commerce Network - Suzanne Mello - Nov 5 2004

Protect your Computers!• Use anti-virus software and

firewalls - keep them up to date

• Keep your operating system up to date with critical security updates and patches

• Don't open emails or attachments from unknown sources

• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist

• Back-up your computer data on disks or CDs often

• Don't share access to your computers with strangers

• If you have a wi-fi network, password protect it

• Disconnect from the Internet when not in use

• Reevaluate your security on a regular basis

• Make sure your employees and family members know this info too!

Page 16: Cyber Crime in a  nutshell
Page 17: Cyber Crime in a  nutshell

Conclusion

Page 18: Cyber Crime in a  nutshell

References

• 1. K.Jaishankar; Cyber Criminology; CRC PRESS; 2011; . • 2. Allison Gavanagh; Sociology in the age of internet; open university press; 2007;..• 3. Nir kshetri; The Global Cyber Crime Industry; Spinger; 2010;• 4. Carl timm & Rechard perez; Seven Deadliest Social Network Attacks; syngress;

2010; .• 5. Jeffrey lan Ross; Cybercrime; chealse house; 2010; .• 6. Susan W.Brenner; Criminal threat from cyber space; Green wood; 2010; . • 7. Christian w.probst ; Insider threats in cyber security; springer; 2010; .• 8. Anthony reyes; cyber crime and digital forensics;syngress; 2007; .• 9. Michael Cross; sense of the cyber crime; syngress;2008; .• 10. IC3; Top 10 Countries by Count; Individual Complainants (Numbered by Rank);

http://www.ic3.gov/media/annualreport/2010_ic3report.pdf ; 2010;• 11. Mac marketing chart; top ten internet crime; http://www.marketingcharts.com/ ;

2010; .• 12. Charles P.Pfleeger; analyzing computer security; paul boger;2011; .

Page 19: Cyber Crime in a  nutshell

19

Thank you all very much for taking the time to listen to this presentation

Sri K.Suresh Babu AbdolMajid Shahgholi HamidReza BarzegarAssistant professor of JNTU M.Tech , JNTU M.Tech, [email protected] [email protected] [email protected]

School of Information Technology, Jawaharlal Nehru Technological University, Hyderabad