Post on 16-Jul-2015
transcript
Index• Introduction
• Classification of cyber crimes
• Fraud and Financial crimes
• Obscene or offensive content
• Harassment
• Online shopping fraud
• Drug trafficking
• Cyber terrorism
• Cyber warfare
• Cyber Crime variants
• Top 10 Cyber Crime Prevention Tips
• Threats
• Conclusion
Introduction:-
• Definition
• Commission of a crime
• Internet and mobile phones
• Threaten to nation’s security and financial health.
• Problems of when there is no evidence
Types of cyber crime:-
• Crimes that target computers directly
• Crimes facilitated by computer networks or devices
Computer networks or devices to advance other ends include:-
Cyber stalking
Fraud and identity theft
Information warfare
Phishing scams
Obscene or offensive content:-
• Communications may be illegal.
• Unlawful varies greatly between countries, and even within nations.
• It is a sensitive area
• Internet pornography
• Altering in an unauthorized way
Harassment:-
• Definition
• Source
• Involvement of a computer
• Example
• Passing Laws to ban cyber crime
• Why harassment occurs over the internet.
• Bullying over the internet may occur for no reason.
Drug trafficking:-
• Internet promotes drug trafficking
• From where drug trafficking evolved
• Lack of face to face communication
• Platform for illegal drugs purchase .
Cyber terrorism:-
• Definition
• Increase in Internet problems and server scans since early 2001.
• Groups to map potential security holes in critical systems.
• How cyber terrorist works ?
• Cyber extortion is a form of cyber terrorism
Cyber stalking:-
• Use of the Internet
• Online harassment and online abuse
• Harassing or threatening
Phishing:-
• Fooling people
•Unsolicited emails
• Fraudulent replica
• Access to the customer's online bank account
• F-Secure Corporation's summary of 'data security’
Cross site scripting:-
• Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users.
• Examples of such code include HTML code and client-side scripts.
• An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls.
Bot Networks:-
• Remotely take control of computers without the users realizing it
• Download malicious codes
• Zombies can for vulneracli
• increase the speed and breadth of their attacks.
• Backdoor
• Problems for organizations
Documented cases:-
• Posting passwords online.
• Stealing credit card information.
• Hacking military's web site.
• Melissa worm.
• Mafia boy
Combating Computer Crime:-
• Source of evidence.
• Records.
• Login for predetermined amount of time.
Cyber Crime Prevention Technique:-
Use Strong Passwords
Secure your computer
Be Social-Media Savvy
Secure your Mobile Device
Install the latest operating system updates
Protect your Data
Secure your wireless network
Protect your e-identity
Avoid being scammed
Call the right person for help
Online Shopping Fraud:-
•What is Online Shopping Fraud.
•What is Online Auction Fraud.
•How to protect your self.
Tips to avoid cyber crime:-
• Unsolicited emails
• Infected attachments
• Restricted Sharing of files & Personal information
• Don’t use Free software
• Use Anti-virus & turn on Firewall
• Use Strong Password
Conclusion:-
•Growing IT sector in country.
•How to reduce cyber theft’s ?
• Precautions to avoid cyber attacks.
Future about Cyber Crime:-
• Smart is the KEY for all home appliance’s
•Drawbacks of advanced techniques
•Hacking your car
•Unauthorized Cloud access
•Digital Kidnapping