Cyber Crimes.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Internet Fraud By: Noelle Woodman.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Internet safety By Lydia Snowden.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber crime & Security Prepared by : Rughani Zarana.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
INTRODUCTION & QUESTIONS.
Information Systems Week 7 Securing Information Systems.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Issues for Computer Users, Electronic Devices, Computer and Safety.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Digital Security Identity theft Copyright Laws Plagiarism, and More.
3.6 Fundamentals of cyber security
CYBER SECURITY...
IT Security  .
A Project on CYBER SECURITY
Phishing is a form of social engineering that attempts to steal sensitive information.
COMPUTER CRIME.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

Cyber Crimes

Introduction Definition Types Classification Cyber Crimes Introduction Definition Types Classification

Cyber Crimes Introduction: Definition: Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Definition: Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission

Types Hacking Theft Cyber Stalking Identity Theft Malicious Software Child soliciting and Abuse

Types Hacking: Type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed The criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location

Types Theft: occurs when a person violates copyrights and downloads music, movies, games and software there are laws that prevent people from illegal downloading Cyber Stalking:  kind of online harassment wherein the victim is subjected to a barrage of online messages and emails

Types Identity Theft: major problem with people using the Internet for cash transactions and banking services a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name Malicious Software: Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.

Cyber Crimes Classification: Against a person Against Properties Crime targetting the government

Categories Individual:  This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming” Property: can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organization’s website or disrupt the systems of the organization.

Categories Government: crimes against a government are referred to as cyber terrorism criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations

Cyber crimes in mobile environment: Smishing : In a smishing scam, people receive a text message on their phone telling them there's a problem with their bank account. The message will contain a phone number to call or a website to log into Vishing: Vishing is similar to smishing except instead of an SMS, a person will receive a voicemail giving them the same information. Spamming : Spam can appear in text messages as well as electronic mail. Besides the inconvenience of deleting spam, users may face charges for unwanted text messages.

Cyber crimes in mobile environment: Data interception: Data interception can occur when an attacker is eavesdropping on communications originating from or being sent to a mobile device. Electronic eavesdropping is possible through various techniques, such as 1. when a mobile device connects to an unsecured WiFi network and an attacker intercepts 2. WiFi sniffing, which occurs when data are sent to or from a device over an unsecured (i.e., not encrypted) network connection Browser exploits: Visiting certain web pages and/or clicking on certain hyperlinks can trigger browser exploits that install malware or perform other adverse actions on a mobile device.

Cyber crimes in mobile environment: Keystroke logging: This is a type of malware that records keystrokes on mobile devices in order to capture sensitive information, such as credit card numbers. Generally keystroke loggers transmit the information they capture to a cyber criminal's website or e-mail address Copy names of popular apps Cybercriminals have also created and distributed malware using the names of popular apps that are not yet available on the Android Market. Android users anticipating these games are the likely victims of this ruse Example : A recent example is a fake version of Temple Run we found in the Android Market

Unauthorized location tracking: Spoofing: Attackers may create fraudulent websites to mimic or "spoof" legitimate sites and in some cases may use the fraudulent sites to distribute malware to mobile devices. E-mail spoofing occurs when the sender address and other parts of an e-mail header are altered to appear as though the e-mail originated from a different source. Unauthorized location tracking: Location tracking allows the whereabouts of registered mobile devices to be known and monitored. While it can be done openly for legitimate purposes, it may also take place surreptitiously. Location data may be obtained through legitimate software applications as well as malware loaded on the user's mobile device.

Cyber crimes in mobile environment: Stealing personal data like files, contacts, photos and other private details. Charging a ‘fee’ for use, update or installation of a legitimate and usually free app. Pretending to be a mobile AV solution but actually having no useful functionality.

Attacks against mobile devices generally occur through four different channels of activities: Software downloads Visiting a malicious website Direct attack through the communication network. Physical attacks

Anatomy of a Hacked Mobile Device: How a hacker can profit from your smartphone

Preventions Cyber security Privacy policy Keep software up to date Use good passwords Disable remote connectivity