Top Banner
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
Page 2: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Index• Introduction

• Classification of cyber crimes

• Fraud and Financial crimes

• Obscene or offensive content

• Harassment

• Online shopping fraud

• Drug trafficking

• Cyber terrorism

• Cyber warfare

• Cyber Crime variants

• Top 10 Cyber Crime Prevention Tips

• Threats

• Conclusion

Page 3: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Introduction:-

• Definition

• Commission of a crime

• Internet and mobile phones

• Threaten to nation’s security and financial health.

• Problems of when there is no evidence

Page 4: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Types of cyber crime:-

• Crimes that target computers directly

• Crimes facilitated by computer networks or devices

Page 5: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Cause of cyber crime:-

Computer viruses

Denial-of-service attack

Malware (malicious code)

Spam

Page 6: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Computer networks or devices to advance other ends include:-

Cyber stalking

Fraud and identity theft

Information warfare

Phishing scams

Page 7: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Fraud and Financial Crimes:-

• Entering False information

•Destroying data

• Scams target consumers

Page 8: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Obscene or offensive content:-

• Communications may be illegal.

• Unlawful varies greatly between countries, and even within nations.

• It is a sensitive area

• Internet pornography

• Altering in an unauthorized way

Page 9: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Harassment:-

• Definition

• Source

• Involvement of a computer

• Example

• Passing Laws to ban cyber crime

• Why harassment occurs over the internet.

• Bullying over the internet may occur for no reason.

Page 10: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Threat’s

• Definition:-

• Various address changement

• Various attacks

Page 11: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Drug trafficking:-

• Internet promotes drug trafficking

• From where drug trafficking evolved

• Lack of face to face communication

• Platform for illegal drugs purchase .

Page 12: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Cyber terrorism:-

• Definition

• Increase in Internet problems and server scans since early 2001.

• Groups to map potential security holes in critical systems.

• How cyber terrorist works ?

• Cyber extortion is a form of cyber terrorism

Page 13: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Cyber Crime variants:-

Page 14: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Cyber stalking:-

• Use of the Internet

• Online harassment and online abuse

• Harassing or threatening

Page 15: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Hacking:-

• Cracking systems

• Gaining unauthorized access

• 37 per cent increase this year

Page 16: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Phishing:-

• Fooling people

•Unsolicited emails

• Fraudulent replica

• Access to the customer's online bank account

• F-Secure Corporation's summary of 'data security’

Page 17: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Cross site scripting:-

• Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.

• Examples of such code include HTML code and client-side scripts.

• An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls.

Page 18: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Vishing:-

•What is Vishing ?

• The victim is often unaware about VoIP

• Aim of vishing

Page 19: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Bot Networks:-

• Remotely take control of computers without the users realizing it

• Download malicious codes

• Zombies can for vulneracli

• increase the speed and breadth of their attacks.

• Backdoor

• Problems for organizations

Page 20: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Documented cases:-

• Posting passwords online.

• Stealing credit card information.

• Hacking military's web site.

• Melissa worm.

• Mafia boy

Page 21: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Combating Computer Crime:-

• Source of evidence.

• Records.

• Login for predetermined amount of time.

Page 22: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Cyber Crime Prevention Technique:-

Use Strong Passwords

Secure your computer

Be Social-Media Savvy

Secure your Mobile Device

Install the latest operating system updates

Protect your Data

Secure your wireless network

Protect your e-identity

Avoid being scammed

Call the right person for help

Page 23: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Online Shopping Fraud:-

•What is Online Shopping Fraud.

•What is Online Auction Fraud.

•How to protect your self.

Page 24: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Tips to avoid cyber crime:-

• Unsolicited emails

• Infected attachments

• Restricted Sharing of files & Personal information

• Don’t use Free software

• Use Anti-virus & turn on Firewall

• Use Strong Password

Page 25: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Conclusion:-

•Growing IT sector in country.

•How to reduce cyber theft’s ?

• Precautions to avoid cyber attacks.

Page 26: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

Future about Cyber Crime:-

• Smart is the KEY for all home appliance’s

•Drawbacks of advanced techniques

•Hacking your car

•Unauthorized Cloud access

•Digital Kidnapping

Page 27: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

•Thank you…..

•Any queries..????

Page 28: CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA

-:SUBMITTED BY:-

KRISHNAKANT MISHRA