SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Cyber Crime
Have You Ever?
• Under the suspect that something’s wrong with your system, got an
Antivirus, and scanned the whole, only to find yellow & red popups
indicating something must be truly messed up! (But How?)
• Found an Email in your Inbox, from a Brazilian Banker or Russia, if you
prefer the latter, claiming that he wants to give you a few billion dollars,
and all he needs is your Bank A/C information and your Address! Why?
Maybe he likes your face! (Frankly, You’re not alone!)
• Clicked on a link, unsuspecting, only to find that your browser crashed,
and you don’t even have a clue why! (Happens)
• Seen explicit or genuinely embarrassing pictures of a
friend/acquaintance/celebrity on a social network (Facebook maybe!) or a
site that mustn’t be named!
• Ordered something that was selling on 89% discount (on a site 99% of
people were unaware of) and waited forever for it to deliver.
• Registered on a site, that said you’d get credits for doing stuff like breaking
captchas and clicking on random ads (Just the money never reaches you)
• Can’t Access your Facebook/Gmail/Yahoo account anymore !!!
• Downloaded a free software, and got a dozen others as freebie, you never
knew! And then scary things start happening on your system..
• Got your Laptop/Phone stolen?
• Started finding evidence of leaked data, you’ve shared with none?
• Faced harassment of any form, in any online services or via your cell
phone?
• Downloaded your favourite Game/Movie over a file sharing service?
• Got emails that don’t make any sense, and are largely unsolicited.
• DONE ANY OF THE ABOVE?
If you can say YES, to even one of
these,
You’ve already been a victim or
perpetrator in Cyber Crime!
Cyber Crime?
In a nutshell, it is simply a crime that has some kind of computer or cyber
(computer/computer networks from word cybernetics) aspect to it.
Cyber crime encompasses any criminal act dealing with computers and
networks.
These include attacks against computer data and systems such as:
Denial of Service Attacks, identity theft, the distribution of child sexual
abuse images, internet auction fraud, the penetration of online financial
services, credit card fraud as well as the deployment of viruses, Botnets, and
various email scams such as phishing and spoofing to gain sensitive
information.
12VICTIMS PER SECOND
378 MILLION VICTIMS PER YEAR
1 MILLION +
VICTIMS PER DAY
NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR
ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES
As the Saying goes.. We’re Never Alone!
As we speak….
50% OF ONLINE ADULTS
HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE
ONLINE SITUATIONS IN THE PAST YEAR
41% OF ONLINE ADULTS
HAVE FALLEN VICTIM TO ATTACKS SUCH AS
MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
*According to Symantec 2013 Report
Who are the Cyber
Criminals?
The Cyber Criminal Profile
This category includes Script
kiddies, and enthusiasts messing
around status quo, hacking
friend’s system and having fun.
This is the Geek we all know!
Also Activists or groups (like
WikiLeaks) seeking to steal data
and release it publicly.
This group (led by technologists
turned cybercriminal) does the
most damage, particularly to
financial institutions, retailers, e-
commerce businesses,
governments, etc. This group of
cybercriminals actually creates
more fraud, remediation and
reputational damage than the
other types of cybercriminals
combined.
Most notably, China, Iran, other
nation-states looking to steal and
infiltrate data.
In case of a cyber warfare, these
are the people, whose involvement
is certain!
Categories
• Individual: This type of cyber crime can be in the form of hacking, identity theft,
cyber bullying, cyber stalking, distributing pornography, trafficking and “grooming”.
• Property: Just like in the real world where a criminal can steal and rob, even in the
cyber world criminals resort to stealing and robbing.
– In this case, they can steal a person’s bank details and siphon off money; misuse the
credit card to make purchases online;
– use malicious software to gain access to an organization’s website or disrupt the
systems of the organization. The malicious software can also damage software and
hardware, just like vandals damage property in the offline world.
• Government: Although not as common as the other two categories, crimes against
a government are referred to as cyber terrorism.
– If successful, this category can wreak havoc and cause panic amongst the civilian
population. In this category, criminals hack government websites, military websites or
circulate propaganda. The perpetrators can be terrorist outfits or unfriendly
governments of other nations.
Cyber Crime can be broadly classified as:
Its Truly Polymorphic (1)
Yes, there are numerous forms. Some of which are:
• Hacking: This is a type of crime wherein a person’s computer is broken into so that
his personal or sensitive information can be accessed.
• Theft: This crime occurs when a person violates copyrights and downloads
music, movies, games and software.
• Cyber Stalking: This is a kind of online harassment wherein the victim is subjected
to a barrage of online messages and emails.
• Malicious Software: These are Internet-based software or programs that are used
to disrupt a network. The software is used to gain access to a system to steal
sensitive information or data or causing damage to software present in the system.
• Identity Theft: A criminal accesses data about a person’s bank account, credit
cards, Social Security, debit card and other sensitive information to siphon money
or to buy things online in the victim’s name
Its Truly Polymorphic (2)
• Child soliciting and Abuse: This is also a type of cyber crime wherein criminals
solicit minors via chat rooms for the purpose of child pornography.
• Cyber-Terrorism: Attacks against computer networks or the information stored
therein which result in violence against Government or persons or property, or at
least cause enough harm to generate fear, are to be considered cyber-terrorism
attacks.
• DoS: Short for denial-of-service attack, a type of attack on a network that is
designed to bring the network to its knees by flooding it with useless traffic.
• Spamming & Spoofing: You can always look inside your spam folder for details!
Just for The Record
• MyDoom's Mass Infection
Estimated damage: $38 billion
– This fast-moving worm first struck in 2004 and tops McAfee's list in terms of monetary damage.
– Due to all the spam it sent, it slowed down global Internet access by 10 per cent and reduced access
to some websites by 50 per cent, causing billions in dollars of lost productivity and online sales.
• Conficker's stealthy destruction
Estimated damage $9.1 billion
– This 2007 worm infected millions of computers and then took its infections further than the previous
worm on our list, as cyber crooks moved from notoriety to professionalism.
– Conficker was designed to download and install malware from sites controlled by the virus writers.
• The "I love you" worm (named after the subject line of the email it came in) proved
irresistible in 2000 as millions of users opened the spam message and downloaded the
attached 'love letter' file and a bitter virus.
– This infamous worm cost companies and government agencies $15 billion to shut down their
computers and remove the infection.
• “Operation Get Rich or Die Tryin’
– For nearly four years ending in 2008, 28-year-old Albert “Segvec” Gonzalez and his accomplices
staged the biggest data thefts in history, stealing millions of credit and debit card magnetic stripe
data for sale on the black market.
• These events just provide a glimpse into the criminal activity potential of Cyber Component!
$113 BN
FRAUD
38%
THEFT
OR
LOSS
21%
REPAIRS
24%
OTHER
17%
83% OF DIRECT FINANCIAL
COSTS ARE A RESULT OF
FRAUD, REPAIRS, THEFT AND
LOSS
USD $298
AVERAGE COST PER VICTIM
Global Price Tag Of
Consumer Cyber Crime:
Above Costs are given for individual victim Organisations.
1
ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION
38
USA
BN
3 MEXICO
BN
8 BRAZIL
BN
13EUROPE
BN
1 RUSSIA
BN
37 CHINA
BN
4INDIA
BN 1 JAPAN
BN
AUSTRALIA
BN
THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME
0.3
SOUTH AFRICA
BN
CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
Economic Impacts
The 2013 Cost of Cyber Crime Study, conducted by Ponemon Institute, provides an estimation of the economic impact
of cybercrime.
• The average annualized cost of cybercrime incurred per organization was $11.56 million, with a range of $1.3
million to $58 million. This is an increase of 26 percent, or $2.6 million, over the average cost reported in 2012.
• Organizations in defense, financial services and energy and utilities suffered the highest cybercrime costs.
• Data theft caused major costs, 43 percent of the total external costs, business disruption or lost productivity
accounts for 36% of external costs
• Organizations experienced an average of 122 successful attacks per week, up from 102 attacks per week in 2012.
• The average time to resolve a cyber attack was 32 days, with an average cost incurred during this period of
$1,035,769, or $32,469 per day—a 55 percent increase over last year’s estimated average cost of $591,780 for a
24-day period.
• Denial-of-service, web-based attacks and insiders account for more than 55% of overall annual cybercrime costs
per organization.
• Smaller organizations incur a significantly higher per-capita cost than larger organizations.
• Recovery and detection are the most costly internal activities.
Economic Impacts (2)
Why do they do it?
Think for a few moments, why would ..
• Someone living 5000 miles away, be interested in looking inside your system
or gaining access to it anyways?
• What are they going to do with the Facebook profile, full of your self-
acclaimed selfies?
• Of what use is any of your personal information to some one else?
• Crash a very popular site? Or slog it down to the knees?
• Steal data? (A more reasonable reason!)
• In short, why would anyone do anything, pulling all the troubles?
• Just to prove his smartness?
• Just to look into someone’s day to day life?
• Just to make a point anyways?!
At one point or another, all of these reasons, will
be just as mundane, as going to college
everyday!
If not, there had been a big, bigger, biggest motivation of all!!
MONEY!
Money is the necessity, which breeds most crime!
But wait…
There have been cases, where Internet has been used as means of
protest, refusal, and opposition as well!
• 2010 saw the political whistle-blower site Wikileaks release confidential communication records
between the US state department and various representatives overseas. In response pressure was
put on Amazon, PayPal, Visa and MasterCard to remove services associated with Wikileaks – in
effect hiding the site, freezing assets, and preventing supporters from financially donating to the
organisation.
• Anonymous saw this as an attempt to censor the truth. The hackers quickly launched an offensive
and armed their various activists with a program called the Low Orbit Ion Cannon, which made it
incredibly easy to execute Distributed Denial Of Services (dDoS). In no time at all the sites of
PayPal, Visa, and MasterCard were shut down, causing the companies losses which PayPal recently
claimed to be in the region of £3.5 million.
• Hacktivists played an essential role in Arab Spring, a revolution in Arab Nations, that lead to the
rulers being thrown out of power.
• Following The bans on video streaming websites and file storage websites, hacktivist group
Anonymous's Indian volunteers went active. This resulted in Distributed Denial of Service attacks
on several government websites.
Information is Invaluable
So Are Zombies (!?)
• Believe it or not, Data & Information pays hard cash!
– Credit card information, Identification Numbers, Company
Secrets, Passwords etc.
– An Organisation’s classified data.
• Enemy Nations and rival countries often perform acts of
spying, espionage, and stealing against each other.
• Once your system has been infiltrated, the hacker can access
the functionalities, on the go!
– He can see whatever you’re doing.
– Even watch you on your webcam (which can be embarrassing)
– He can use your system, to perform attacks on other systems (yes, like
a zombie following orders!)
A Sneak-Peek into the Cyber Crime
Economy
• Long gone are the days when cybercrime was tantamount to teenage
miscreants causing mischief in their parents’ basement.
• Today, as any commercial enterprise, cybercrime has evolved into a
complex, highly organized hierarchy involving leaders, engineers, infantry,
and hired money mules.
• Like any legitimate commercial enterprise, each player has a designated
role or function to perform.
• Cybercrime pays, it’s very common to find advertising looking to recruit
cyber specialists (e.g. botmaster, malware engineers) promising amount of
money between $2,000 and $5,000 a month.
“ Cybercriminals Today Mirror Legitimate Business Processes “
- Fortinet 2013 Cybercrime Report
Cyber Crime for Sale
• Hard to believe, but nowadays there are organisations selling services like
Hacking, Spamming, Denial Of Service Attacks.
• So, you can go online, and BUY a Hacking Service to hack your ex’s profile, or
maybe if you are into business, knock a competitor’s website down!
• There are testing platforms like virtest.com which enables cyber criminals to
test their malware before releasing it.
• Cyber Criminals now have crime packs, with business Intelligence Reporting
Dashboards to manage the distribution of their malicious code!
• For Instance, the Market Leader in Malware Distribution, Blackhole Exploit
Kit, comes with Technical Guide, Demo Videos, and Dedicated Customer
Care!
How Do They Do It?
• All these forms of Cyber Crime are due to one or more kind of Attacks by the Cyber
Criminals or the Hacktivist in question. Some common types of Attack are:
• Passive Attack
– A passive attack monitors unencrypted traffic and looks for clear-text passwords and
sensitive information that can be used in other types of attacks.
– Passive attacks include traffic analysis, monitoring of unprotected
communications, decrypting weakly encrypted traffic, and capturing authentication
information such as passwords.
– Passive attacks result in the disclosure of information or data files to an attacker without
the consent or knowledge of the user.
• Active Attack
– In an active attack, the attacker tries to bypass or break into secured systems.
– This can be done through stealth, viruses, worms, or Trojan horses.
– Active attacks include attempts to circumvent or break protection features, to introduce
malicious code, and to steal or modify information.
How Do They Do It? (2)
• Close-in attack
– involves someone attempting to get physically close to network components, data, and
systems in order to learn more about a network.
– Close-in attacks consist of regular individuals attaining close physical proximity to
networks, systems, or facilities for the purpose of modifying, gathering, or denying
access to information. Eg. Social Engineering.
• Distributed Attack
– A distributed attack requires that the adversary introduce code, such as a Trojan horse
or back-door program, to a “trusted” component or software that will later be
distributed to many other companies.
• Insider Attack
– An insider attack involves someone from the inside, such as a disgruntled employee,
attacking the network. Insider attacks can be malicious or non malicious.
• Phishing Attack
– In phishing attack the hacker creates a fake web site that looks exactly like a popular site
such as the SBI bank or paypal. The phishing part of the attack is that the hacker then
sends an e-mail message trying to trick the user into clicking a link that leads to the fake
site.
How Do They Do It? (3)
• Hijack attack
– In a hijack attack, a hacker takes over a session between you and another
individual and disconnects the other individual from the communication.
– You still believe that you are talking to the original party and may send private
information to the hacker by accident.
– Eg. Man In The Middle Attack (Beware Of Public Wi-Fi’s)
• Password attack
– An attacker tries to crack the passwords stored in a network account database
or a password-protected file. There are three major types of password attacks:
a dictionary attack, a brute-force attack, and a hybrid attack.
• Buffer overflow
– Abuffer overflow attack is when the attacker sends more data to an
application than is expected. It usually results in the attacker gaining
administrative access to the system in a Command prompt or shell.
• Spoof attack
– In a spoof attack, the hacker modifies the source address of the packets he or
she is sending so that they appear to be coming from someone else. This may
be an attempt to bypass your firewall rules.
Legal Issues
• Cyber Criminals, despite theft of millions of dollars, rarely get
arrested.
• Most laws are National in their implementation, despite Cyber
Crime Conventions, where the Internet is borderless and
International by definition.
• Countries do not agree, which makes this area exceptionally
challenging from legal perspective.
• So, Cyber Criminals operating from the Ends of the
world, evade laws, taking full advantage of anonymity and
loopholes is International Laws.
Indian Laws & Cyber Crime
• The Indian Law has not given any definition to the term ‘cyber crime’.
• In fact, the Indian Penal Code does not use the term ‘cyber crime’ at any point
even after its amendment by the Information Technology (amendment) Act
2008, the Indian Cyber law.
• But “Cyber Security” is defined under Section (2) (b) means protecting
information, equipment, devices, computer, computer resource, communication
device and information stored therein from unauthorized access.
• In essence, cyber law is an attempt to apply laws designed for the physical
world, to human activity on the Internet.
• It has a separate chapter XI entitled “Offences” in which various cyber crimes
have been declared as penal offences punishable with imprisonment and fine.
Better Be Safe Than Sorry!
• Use Strong Passwords.
– Don’t use dictionary words, or numbers, or popular names. Use a combination of all!
– Try to use different passwords for all online services.
• Secure your computer:
– Activate your firewall
Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites
and will keep out some types of viruses and hackers.
– Use anti-virus/malware software
Prevent viruses from infecting your computer by installing and
– regularly update anti-virus software.
• Block spyware attacks.
• Secure your Mobile Devices
• Install the latest operating system and software updates
• Protect your Data
Use encryption for your most sensitive files such as tax returns or financial
records, make regular back-ups.
Better Be Safe Than Sorry! (2)
• Review bank and credit card statements regularly
– The impact of identity theft and online crimes can be greatly reduced if you can catch it
shortly after your data is stolen or when the first use of your information is attempted
• Avoid being scammed
– Always think before you click on a link or file of unknown origin.
– Don’t feel pressured by any emails!
• Protect your e-identity
– Be cautious when giving out personal information such as your name, address, phone number
or financial information on the Internet. Make sure that websites are secure.
• Secure your wireless network
– Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured.
– Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Use VPNs (Virtual Private Networks) like
vemeo.
– Avoid conducting financial or corporate transactions on these networks.
• In an organisation, Cyber-Education and Awareness across the staff will go a long
way to protect against many types of cybercrime.
And..
• The Internet is a fantastic Resource.
• It promotes business, Learning, Expression, and
communication.
• Keep Your Systems Safe & Secure, A large majority of
Cyber Crimes can be prevented by precautionary
measures alone!
• Even if we can’t stop it, Let’s Make Life Much Much
More Difficult For Cyber Criminals!
Cyber crime: A Quick Survey

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security
cyber securitycyber security
cyber security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ethical Hacking - Hackers and crackers
Ethical Hacking  - Hackers and crackersEthical Hacking  - Hackers and crackers
Ethical Hacking - Hackers and crackers
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

Andere mochten auch

Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Resultsa2columnd12
 
Questionnaire results
Questionnaire resultsQuestionnaire results
Questionnaire resultslauraf1996
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Survey questionnaire format for project
Survey questionnaire format for projectSurvey questionnaire format for project
Survey questionnaire format for projecthappy4ever321
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Questionnaire mba project
Questionnaire  mba  projectQuestionnaire  mba  project
Questionnaire mba projectAashi Yadav
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Social Studies SBA
Social Studies SBA Social Studies SBA
Social Studies SBA Quarrie
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Michael Roa
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesisnone
 

Andere mochten auch (20)

Cyber Bullying Questionnaire Results
Cyber Bullying Questionnaire ResultsCyber Bullying Questionnaire Results
Cyber Bullying Questionnaire Results
 
Questionnaire results
Questionnaire resultsQuestionnaire results
Questionnaire results
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Survey questionnaire format for project
Survey questionnaire format for projectSurvey questionnaire format for project
Survey questionnaire format for project
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Social studies sba
Social studies sba Social studies sba
Social studies sba
 
Questionnaire mba project
Questionnaire  mba  projectQuestionnaire  mba  project
Questionnaire mba project
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Social Studies SBA
Social Studies SBA Social Studies SBA
Social Studies SBA
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Sample Questionnaire
Sample QuestionnaireSample Questionnaire
Sample Questionnaire
 
Bullying thesis
Bullying thesisBullying thesis
Bullying thesis
 

Ähnlich wie Cyber crime: A Quick Survey

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 

Ähnlich wie Cyber crime: A Quick Survey (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 

Kürzlich hochgeladen

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 

Kürzlich hochgeladen (20)

Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 

Cyber crime: A Quick Survey

  • 2. Have You Ever? • Under the suspect that something’s wrong with your system, got an Antivirus, and scanned the whole, only to find yellow & red popups indicating something must be truly messed up! (But How?)
  • 3. • Found an Email in your Inbox, from a Brazilian Banker or Russia, if you prefer the latter, claiming that he wants to give you a few billion dollars, and all he needs is your Bank A/C information and your Address! Why? Maybe he likes your face! (Frankly, You’re not alone!) • Clicked on a link, unsuspecting, only to find that your browser crashed, and you don’t even have a clue why! (Happens) • Seen explicit or genuinely embarrassing pictures of a friend/acquaintance/celebrity on a social network (Facebook maybe!) or a site that mustn’t be named! • Ordered something that was selling on 89% discount (on a site 99% of people were unaware of) and waited forever for it to deliver. • Registered on a site, that said you’d get credits for doing stuff like breaking captchas and clicking on random ads (Just the money never reaches you) • Can’t Access your Facebook/Gmail/Yahoo account anymore !!!
  • 4. • Downloaded a free software, and got a dozen others as freebie, you never knew! And then scary things start happening on your system.. • Got your Laptop/Phone stolen? • Started finding evidence of leaked data, you’ve shared with none? • Faced harassment of any form, in any online services or via your cell phone? • Downloaded your favourite Game/Movie over a file sharing service? • Got emails that don’t make any sense, and are largely unsolicited. • DONE ANY OF THE ABOVE?
  • 5. If you can say YES, to even one of these, You’ve already been a victim or perpetrator in Cyber Crime!
  • 6. Cyber Crime? In a nutshell, it is simply a crime that has some kind of computer or cyber (computer/computer networks from word cybernetics) aspect to it. Cyber crime encompasses any criminal act dealing with computers and networks. These include attacks against computer data and systems such as: Denial of Service Attacks, identity theft, the distribution of child sexual abuse images, internet auction fraud, the penetration of online financial services, credit card fraud as well as the deployment of viruses, Botnets, and various email scams such as phishing and spoofing to gain sensitive information.
  • 7. 12VICTIMS PER SECOND 378 MILLION VICTIMS PER YEAR 1 MILLION + VICTIMS PER DAY NEARLY 2.8 TIMES AS MANY BABIES BORN EACH YEAR ENOUGH TO FILL WEMBLEY STADIUM (ENGLAND) MORE THAN 10 TIMES As the Saying goes.. We’re Never Alone! As we speak….
  • 8. 50% OF ONLINE ADULTS HAVE BEEN VICTIMS OF CYBERCRIME AND / OR NEGATIVE ONLINE SITUATIONS IN THE PAST YEAR 41% OF ONLINE ADULTS HAVE FALLEN VICTIM TO ATTACKS SUCH AS MALWARE, VIRUSES, HACKING, SCAMS, FRAUD AND THEFT
  • 10. Who are the Cyber Criminals? The Cyber Criminal Profile
  • 11. This category includes Script kiddies, and enthusiasts messing around status quo, hacking friend’s system and having fun. This is the Geek we all know! Also Activists or groups (like WikiLeaks) seeking to steal data and release it publicly.
  • 12. This group (led by technologists turned cybercriminal) does the most damage, particularly to financial institutions, retailers, e- commerce businesses, governments, etc. This group of cybercriminals actually creates more fraud, remediation and reputational damage than the other types of cybercriminals combined.
  • 13. Most notably, China, Iran, other nation-states looking to steal and infiltrate data. In case of a cyber warfare, these are the people, whose involvement is certain!
  • 14. Categories • Individual: This type of cyber crime can be in the form of hacking, identity theft, cyber bullying, cyber stalking, distributing pornography, trafficking and “grooming”. • Property: Just like in the real world where a criminal can steal and rob, even in the cyber world criminals resort to stealing and robbing. – In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make purchases online; – use malicious software to gain access to an organization’s website or disrupt the systems of the organization. The malicious software can also damage software and hardware, just like vandals damage property in the offline world. • Government: Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. – If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations. Cyber Crime can be broadly classified as:
  • 15. Its Truly Polymorphic (1) Yes, there are numerous forms. Some of which are: • Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. • Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. • Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. • Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system. • Identity Theft: A criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name
  • 16. Its Truly Polymorphic (2) • Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. • Cyber-Terrorism: Attacks against computer networks or the information stored therein which result in violence against Government or persons or property, or at least cause enough harm to generate fear, are to be considered cyber-terrorism attacks. • DoS: Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. • Spamming & Spoofing: You can always look inside your spam folder for details!
  • 17. Just for The Record • MyDoom's Mass Infection Estimated damage: $38 billion – This fast-moving worm first struck in 2004 and tops McAfee's list in terms of monetary damage. – Due to all the spam it sent, it slowed down global Internet access by 10 per cent and reduced access to some websites by 50 per cent, causing billions in dollars of lost productivity and online sales. • Conficker's stealthy destruction Estimated damage $9.1 billion – This 2007 worm infected millions of computers and then took its infections further than the previous worm on our list, as cyber crooks moved from notoriety to professionalism. – Conficker was designed to download and install malware from sites controlled by the virus writers. • The "I love you" worm (named after the subject line of the email it came in) proved irresistible in 2000 as millions of users opened the spam message and downloaded the attached 'love letter' file and a bitter virus. – This infamous worm cost companies and government agencies $15 billion to shut down their computers and remove the infection. • “Operation Get Rich or Die Tryin’ – For nearly four years ending in 2008, 28-year-old Albert “Segvec” Gonzalez and his accomplices staged the biggest data thefts in history, stealing millions of credit and debit card magnetic stripe data for sale on the black market. • These events just provide a glimpse into the criminal activity potential of Cyber Component!
  • 18. $113 BN FRAUD 38% THEFT OR LOSS 21% REPAIRS 24% OTHER 17% 83% OF DIRECT FINANCIAL COSTS ARE A RESULT OF FRAUD, REPAIRS, THEFT AND LOSS USD $298 AVERAGE COST PER VICTIM Global Price Tag Of Consumer Cyber Crime: Above Costs are given for individual victim Organisations.
  • 19. 1 ALL AMOUNTS IN USD ROUNDED TO THE NEAREST BILLION 38 USA BN 3 MEXICO BN 8 BRAZIL BN 13EUROPE BN 1 RUSSIA BN 37 CHINA BN 4INDIA BN 1 JAPAN BN AUSTRALIA BN THE GLOBAL PRICE TAG OF CONSUMER CYBERCRIME 0.3 SOUTH AFRICA BN CANADA 3 BN; SINGAPORE 1 BN; NEW ZEALAND 0.1 BN; TURKEY 2 BN; SAUDI ARABIA 0.5 BN; UAE 0.3 BN; COLOMBIA 0.5 BN
  • 20. Economic Impacts The 2013 Cost of Cyber Crime Study, conducted by Ponemon Institute, provides an estimation of the economic impact of cybercrime. • The average annualized cost of cybercrime incurred per organization was $11.56 million, with a range of $1.3 million to $58 million. This is an increase of 26 percent, or $2.6 million, over the average cost reported in 2012. • Organizations in defense, financial services and energy and utilities suffered the highest cybercrime costs. • Data theft caused major costs, 43 percent of the total external costs, business disruption or lost productivity accounts for 36% of external costs • Organizations experienced an average of 122 successful attacks per week, up from 102 attacks per week in 2012. • The average time to resolve a cyber attack was 32 days, with an average cost incurred during this period of $1,035,769, or $32,469 per day—a 55 percent increase over last year’s estimated average cost of $591,780 for a 24-day period. • Denial-of-service, web-based attacks and insiders account for more than 55% of overall annual cybercrime costs per organization. • Smaller organizations incur a significantly higher per-capita cost than larger organizations. • Recovery and detection are the most costly internal activities.
  • 22. Why do they do it? Think for a few moments, why would .. • Someone living 5000 miles away, be interested in looking inside your system or gaining access to it anyways? • What are they going to do with the Facebook profile, full of your self- acclaimed selfies? • Of what use is any of your personal information to some one else? • Crash a very popular site? Or slog it down to the knees? • Steal data? (A more reasonable reason!) • In short, why would anyone do anything, pulling all the troubles? • Just to prove his smartness? • Just to look into someone’s day to day life? • Just to make a point anyways?!
  • 23. At one point or another, all of these reasons, will be just as mundane, as going to college everyday! If not, there had been a big, bigger, biggest motivation of all!! MONEY! Money is the necessity, which breeds most crime!
  • 24. But wait… There have been cases, where Internet has been used as means of protest, refusal, and opposition as well! • 2010 saw the political whistle-blower site Wikileaks release confidential communication records between the US state department and various representatives overseas. In response pressure was put on Amazon, PayPal, Visa and MasterCard to remove services associated with Wikileaks – in effect hiding the site, freezing assets, and preventing supporters from financially donating to the organisation. • Anonymous saw this as an attempt to censor the truth. The hackers quickly launched an offensive and armed their various activists with a program called the Low Orbit Ion Cannon, which made it incredibly easy to execute Distributed Denial Of Services (dDoS). In no time at all the sites of PayPal, Visa, and MasterCard were shut down, causing the companies losses which PayPal recently claimed to be in the region of £3.5 million. • Hacktivists played an essential role in Arab Spring, a revolution in Arab Nations, that lead to the rulers being thrown out of power. • Following The bans on video streaming websites and file storage websites, hacktivist group Anonymous's Indian volunteers went active. This resulted in Distributed Denial of Service attacks on several government websites.
  • 25. Information is Invaluable So Are Zombies (!?) • Believe it or not, Data & Information pays hard cash! – Credit card information, Identification Numbers, Company Secrets, Passwords etc. – An Organisation’s classified data. • Enemy Nations and rival countries often perform acts of spying, espionage, and stealing against each other. • Once your system has been infiltrated, the hacker can access the functionalities, on the go! – He can see whatever you’re doing. – Even watch you on your webcam (which can be embarrassing) – He can use your system, to perform attacks on other systems (yes, like a zombie following orders!)
  • 26. A Sneak-Peek into the Cyber Crime Economy
  • 27. • Long gone are the days when cybercrime was tantamount to teenage miscreants causing mischief in their parents’ basement. • Today, as any commercial enterprise, cybercrime has evolved into a complex, highly organized hierarchy involving leaders, engineers, infantry, and hired money mules. • Like any legitimate commercial enterprise, each player has a designated role or function to perform. • Cybercrime pays, it’s very common to find advertising looking to recruit cyber specialists (e.g. botmaster, malware engineers) promising amount of money between $2,000 and $5,000 a month. “ Cybercriminals Today Mirror Legitimate Business Processes “ - Fortinet 2013 Cybercrime Report
  • 28. Cyber Crime for Sale • Hard to believe, but nowadays there are organisations selling services like Hacking, Spamming, Denial Of Service Attacks. • So, you can go online, and BUY a Hacking Service to hack your ex’s profile, or maybe if you are into business, knock a competitor’s website down! • There are testing platforms like virtest.com which enables cyber criminals to test their malware before releasing it. • Cyber Criminals now have crime packs, with business Intelligence Reporting Dashboards to manage the distribution of their malicious code! • For Instance, the Market Leader in Malware Distribution, Blackhole Exploit Kit, comes with Technical Guide, Demo Videos, and Dedicated Customer Care!
  • 29.
  • 30. How Do They Do It? • All these forms of Cyber Crime are due to one or more kind of Attacks by the Cyber Criminals or the Hacktivist in question. Some common types of Attack are: • Passive Attack – A passive attack monitors unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks. – Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. – Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user. • Active Attack – In an active attack, the attacker tries to bypass or break into secured systems. – This can be done through stealth, viruses, worms, or Trojan horses. – Active attacks include attempts to circumvent or break protection features, to introduce malicious code, and to steal or modify information.
  • 31. How Do They Do It? (2) • Close-in attack – involves someone attempting to get physically close to network components, data, and systems in order to learn more about a network. – Close-in attacks consist of regular individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information. Eg. Social Engineering. • Distributed Attack – A distributed attack requires that the adversary introduce code, such as a Trojan horse or back-door program, to a “trusted” component or software that will later be distributed to many other companies. • Insider Attack – An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network. Insider attacks can be malicious or non malicious. • Phishing Attack – In phishing attack the hacker creates a fake web site that looks exactly like a popular site such as the SBI bank or paypal. The phishing part of the attack is that the hacker then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site.
  • 32. How Do They Do It? (3) • Hijack attack – In a hijack attack, a hacker takes over a session between you and another individual and disconnects the other individual from the communication. – You still believe that you are talking to the original party and may send private information to the hacker by accident. – Eg. Man In The Middle Attack (Beware Of Public Wi-Fi’s) • Password attack – An attacker tries to crack the passwords stored in a network account database or a password-protected file. There are three major types of password attacks: a dictionary attack, a brute-force attack, and a hybrid attack. • Buffer overflow – Abuffer overflow attack is when the attacker sends more data to an application than is expected. It usually results in the attacker gaining administrative access to the system in a Command prompt or shell. • Spoof attack – In a spoof attack, the hacker modifies the source address of the packets he or she is sending so that they appear to be coming from someone else. This may be an attempt to bypass your firewall rules.
  • 33. Legal Issues • Cyber Criminals, despite theft of millions of dollars, rarely get arrested. • Most laws are National in their implementation, despite Cyber Crime Conventions, where the Internet is borderless and International by definition. • Countries do not agree, which makes this area exceptionally challenging from legal perspective. • So, Cyber Criminals operating from the Ends of the world, evade laws, taking full advantage of anonymity and loopholes is International Laws.
  • 34. Indian Laws & Cyber Crime • The Indian Law has not given any definition to the term ‘cyber crime’. • In fact, the Indian Penal Code does not use the term ‘cyber crime’ at any point even after its amendment by the Information Technology (amendment) Act 2008, the Indian Cyber law. • But “Cyber Security” is defined under Section (2) (b) means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access. • In essence, cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet. • It has a separate chapter XI entitled “Offences” in which various cyber crimes have been declared as penal offences punishable with imprisonment and fine.
  • 35. Better Be Safe Than Sorry! • Use Strong Passwords. – Don’t use dictionary words, or numbers, or popular names. Use a combination of all! – Try to use different passwords for all online services. • Secure your computer: – Activate your firewall Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. – Use anti-virus/malware software Prevent viruses from infecting your computer by installing and – regularly update anti-virus software. • Block spyware attacks. • Secure your Mobile Devices • Install the latest operating system and software updates • Protect your Data Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups.
  • 36. Better Be Safe Than Sorry! (2) • Review bank and credit card statements regularly – The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted • Avoid being scammed – Always think before you click on a link or file of unknown origin. – Don’t feel pressured by any emails! • Protect your e-identity – Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure. • Secure your wireless network – Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. – Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Use VPNs (Virtual Private Networks) like vemeo. – Avoid conducting financial or corporate transactions on these networks. • In an organisation, Cyber-Education and Awareness across the staff will go a long way to protect against many types of cybercrime.
  • 37. And.. • The Internet is a fantastic Resource. • It promotes business, Learning, Expression, and communication. • Keep Your Systems Safe & Secure, A large majority of Cyber Crimes can be prevented by precautionary measures alone! • Even if we can’t stop it, Let’s Make Life Much Much More Difficult For Cyber Criminals!