Cyber crimes

Post on 28-Jan-2015

491 views 5 download

Tags:

description

 

transcript

Group MembersGroup Members

• Muhammad NASIR MB-12-04

• Waqas AHMAD MB-12-05

• Maryam BATOOL MB-12-06

• M.Tahir SHAH MB-12-64

• Sarfraz AHMAD MB-12-65

• Javaad AHMAD MB-12-66

CYBERCYBER CRIMESCRIMES

What are cyber crimesWhat are cyber crimes

• Offences that are committed against individuals or groups of individuals (by using computer) with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly.

Historical PerspectiveHistorical Perspective

• 1960s and 1970s: Hacker: a positive term

A Hacker: An expert, knowledgeable about programming and operating systems

• 1970s onwards:Hacker: a term, which progressively became more

negative.

A Hacker: Someone using computers without authorization

Why we study about cyber crimesWhy we study about cyber crimes

• Almost every one is using computer From white collar criminals to terrorist

organizations and from teenagers to adults• Conventional crimes like Forgery , extortion, and

kidnapping etc. are being committed with the help of computer

• New generation is growing up with computers• MOST IMPORTANT business transactions are

carried out through internet.

Profile of cyber criminals

• Disgruntled employee.

• Teenagers.

• Professional hackers.

• Business rivals.

• Political hacktivists.

• Ex-friends.

• Divorced husband etc.

Common cyber crime attacksCommon cyber crime attacks

• Hacking

• Cracking

• Script kiddies

• Vandals

• Spoofing

• Denial of services

• Snooping

Common cyber crimes attacksCommon cyber crimes attacks

• Software privacy

• Net Extortion

• Virus dissemination

• Phishing

• Cyber Stalking

• Salami attacks

• Credit card fraud

HackingHackingHacking is access of computer resource,

without authorization

Cracking A hacker who uses his or her skills to

commit unlawful acts, or to deliberately create mischief

Script kiddiesScript kiddies A hacker who downloads the scripts and

uses them to commit unlawful acts, or to deliberately create mischief, without fully understanding the scripts

Vandals A person who deliberately destroys or

damages public or private property by using computer

SpoofingSpoofing Spoofing is the criminally fraudulent

process of attempting to acquire sensitive information such as usernames, passwords and credit card details etc.

Denial of services

Any problem that makes it difficult or impossible for the system to continue to perform productive work

SnoopingSnooping

• Snooping is unauthorized access to another person's or company's data. The practice is similar to eavesdropping but is not necessarily limited to gaining access to data during its transmission. Snooping can include casual observance of an e-mail or watching what someone else is typing.

Software privacy Software privacy • Theft of software through illegal copying of

genuine programs.

Retail revenue losses are ever increasing due to this crime.

This can be done in various ways such as end user copying, hard disk loading and illegal download from the internet.

Net Extortion Net Extortion • Copying the company confidential data in order

to extort said company for huge amount.

Virus dissemination Malicious software that attaches itself to t other

software.

(virus, worms, Trojan horse. Time bomb, rabbit and bacterium are the malicious soft wares.

Credit card Frauds

• You simply have to type your credit card number into www page off the vender for online transaction and if electronic transactions are not secured the credit card number can be stolen by the hacker who can misuse this credit card.

PHISHING

• It is technique of pulling out confidential information from the bank or financial institutional account holders by deceptive means.

Credit card writer

ATM as usual

Inside the boxInside the box

Cyber Stalking• The cyber follows the victim by sending

emails or entering the chat rooms frequently

Threatening • The criminals sends threatening email or

comes in contact in chat rooms with victims.

Salami Attack

• In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.

Criminal makes such programs that deducts small amounts as 2.5 rupees from all the customers accounts of a bank and deposits in his own account. In such a case no customer will approach to bank for such small amount.

Pakistan is one of the few countries where cyber crime laws are still in the pipeline waiting for implementation. It is certainly not as if we don’t face that many cyber crimes here. In fact, Pakistan is currently facing the following types of it:

Cyber Crimes in Pakistan

• Financial crimes• Cyber pornography• Sale of illegal articles• Online gambling• Intellectual property crimes• Email spoofing• Cyber stalking• Forgery

• Unauthorized access to computer systems\networks• Theft of information contained in electronic form• Virus/worm attacks• Trojan attacks• Internet time theft• Password cracking

General PreventionsGeneral Preventions

• Spam blockerSpam blocker Turn on your spam blocker. Most Internet

providers provide a spam blocking feature to prevent unwanted messages.

• Firewall protection

Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.

Anti-virus software

Make sure you have adequate anti-virus software for your computer. You also need to make sure you regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any malware, spyware, viruses and other problems.

Encryption softwareEncryption software

• Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.

Caution in providing personal Caution in providing personal informationinformation

• Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.

Secure shoppingSecure shopping

• Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud

Monitoring activitiesMonitoring activities

• Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity