Date post: | 18-May-2015 |
Category: |
Technology |
Upload: | hem-pokhrel |
View: | 1,151 times |
Download: | 2 times |
Cyber Crime - Prime College
Presenter’s Profile
Hem Sagar Pokhrel
MSP 2013
Prime College
Volunteer, Youth Action Nepal
Anamnagar, Kathmandu-Nepal
@NepaliSagar
www.facebook.com/
geeksagar
WHAT IS CYBER CRIME ?
Computer crime or cybercrime is a
form of crime where the Internet or
computers are used as a medium to
commit crime.
National Research Council,
"Computers at Risk",
1991.
"The modern thief can steal more with
a computer than with a gun.
Tomorrow's terrorist may be able to do
more damage with a keyboard than
with a bomb".
TYPES OF CYBER CRIME
1. Cybercrimes against
persons.
2. Cybercrimes against
property.
3. Cybercrimes against
government.
1.AGAINST PERSON
Includes various harassment of anyone
with the use of a computer such as e-
mail.
E.g.:- The Melissa virus first appeared on the internet
in March of 1999. It spread rapidly throughout
computer systems in the United States and Europe. It
is estimated that the virus caused 80 million dollars in
damages to computers worldwide.
AGAINST PERSON contd..
oCyber harassment is a distinct Cybercrime.
oHarassment can be sexual, racial, religious, or other.
Persons perpetuating such harassment are also guilty
of cybercrimes.
oCyber harassment as a crime also brings us to
another related area of violation of privacy of citizens.
oNo one likes any other person invading the
invaluable and extremely touchy area of his or her
own privacy which the medium of internet grants to
the citizen.
2.AGAINST PROPERTY
Include computer vandalism (destruction of others' property), transmission of harmful programmes.
E.g. : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.
3.AGAINST GOVERNMENT
An individual "cracks" into a
government or military maintained
website or systems.
This crime manifests itself into
terrorism .
E.g. Group like LUZSEC Anonymous
Why learn about CYBER CRIME ?
Everybody is using COMPUTERS.
New generation is growing up with computers
Terrorist targeted the teenagers.
Conventional crimes like Forgery,, extortion,,
kidnapping are being committed with the help
of computers.
MOST IMPORTANT - Monetary transactions
are moving on to the INTERNET
IN SHORT
Cyber CRIME is any
crime where Computer is
a target. Computer is a tool of
crime Computer is incidental
to crime
VICTIMS
Desperados and greedy
people
Unskilled &
Inexperienced
Unlucky people
Hacker and Cracker
A Hacker is a person who just wants to know the
inner workings of computer systems, helping to
improve them if they detect flaws in their security.
A Cracker is a person with high skills in computer
systems (the same way that hackers), these skills are
regularly used for personal benefit or for harm.
HACKING Illegal intrusion into a computer system without
the permission of the computer owner/user.
Types1. Ethical hacking &2. Non- ethical hacking
VIRUS DISSEMINATION
Malicious software that
attaches itself to other
software.e.g.:-1. Virus, worms, 2. Trojan Horse, 3. Time bomb,4. Logic Bomb,
SOFTWARE PRIVACY
Theft of software through the illegal copying
of genuine programs or the counterfeiting
and distribution of products intended to pass
for the original.
Retail revenue losses worldwide are ever
increasing due to this crime Can be done in
various ways
E.g.:-End user copying, Hard disk loading,
Counterfeiting,
Illegal downloads from the internet etc.
INTERNET RELAY CHAT
Internet Relay Chat (IRC) servers have chat
rooms in which people from anywhere the
world can come together and chat with each
other.
Criminals use it for meeting co-conspirators.
Hackers use it for discussing their exploits /
sharing the techniques.
DDOS ATTACK
malicious action typically taken against a
computer system such as a server or
webpage host. Server Flooding is achieved by causing a
server to attempt to respond to an excessive number of users simultaneously
Server crashing is typically achieved through a malicious piece of software that uses a flaw or weakness in the server programming to cause the server to crash and be inaccessible until restarted.
Email Bombing
Form of denial of service attack that floods
an inbox and mail server with messages.
This type of attack can be a nuisance on a
low level, but it can also become a serious
problem.
There are a variety of techniques that can be
used to address email bombing. Maintaining -multiple email addresses for different activities can help.
NET EXTORTION
Copying the company’s
confidential data in order to
extort paid company for huge
amount.
CYBER DEFAMATION
The Criminal sends emails containing
defamatory matters to all concerned off the
victim or post the defamatory matters on a
website..
E.g.:-(disgruntled employee may do this
against boss,, ex-boys friend against girl,,
divorced husband against wife etc.)
PHISHING
It is technique of pulling out
confidential information from
the bank/financial
institutional account holders
by deceptive means.
PHISHINGIt is technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means.
PHISHINGIt is technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means.
How to be secure then .???
1. Enabled the “Always use HTTPS” setting for
Facebook, Twitter, Outlook, Gmail, Google and all the
other online services.
2. Offers via an unknown person or offers that are too good
to be true should be suspect.
3. Don’t click the links in emails. Always go to the
source or manually type in the address in your web
browser.
4. Don’t use a debit card online. If your debit card is
compromised that’s money out of your bank account.
Credit cards provide more protection and less liability.
How to be secure then .???
5. Secure your PC. Update your critical security patches
and anti-virus and only shop from a secured Internet
connection.
6. Change your password often and use combination
of Uppercase, Lowercase, Special characters and
characters as password.
CYBER CRIME AND
SOCIAL MEDIA
Do take advantage of privacy settings and
encourage your friends to do the same
Do ask questions before clicking a link.
Do accept friend requests with caution. D
Don’t include too much identifying information.
Don’t automatically trust everyone.
Facebook Security
Stay Updated
Secure Web Hosts
Moderate the comment
Backups
Twitter Security
Never share personal
information
Don’t be too specific
Link your twitter account
Don’t spit excessive personal
information, this is about as
dangerous on any other social
network. if necessary.
Twitter Security Don’t tweet about moving
servers, changing passwords or any other type of situation where your security could be compromised more easily.
Review applications that use your twitter account with other networking sites like Facebook only
•Stay Updated
•Secure Web Hosts
•Moderate the comment
•Backups
How To Secure Your Blog
Malware bytes' Anti-
Malware
True Crypt
CCleaner
Flash Cookie Remover
Offline Protection
Security Tips | Smartphone Users
Install anti-virus software, and keep it
updated.
Use a PIN code or pattern lock on your phone.
Turn off geo-tagging, or turn off photo auto-
uploads.
Avoid location "check-ins.“
Don't store passwords on the phone.
Enable remote 'wiping' of data.
Encrypt public Wi-Fi transmissions.
Our Expectation Now Onwards
Conscious about Electronic Transaction act 2064
Don't edit images in unwanted manner and also do
not like, share ,tag and post such edited images in
any Social Networking sites.
Do not keep multi accounts of same sites | delete if
you already have.
Use privacy setting to avoid cyber theft.
Hide your Geographical Location as far as
practicable.
References
facebook.com/security
fass10012041.wordpress.com
forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-
DNS
en.wikipedia.org/wiki/
f-secure.com/weblog/
totaldefense.com/securityblog.aspx
twitter.com/safety
THANK YOU