SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
1
2
Abstract:
Being one of the most rapidly expanding sector, internet has become one of the
most vital part of our life from work to entertainment there's no other option
now but it comes with a price of our privacy.
Cyber Crimes are also on the rapid expansion causing our sensitive data to be
used without our permission. Governments are aware of this matter doing
everything they can to secure our networks but many say security is just an
illusion.
In this whole report we will analyse the strength of the people who are trying to
spoil the Cyber Ecosystem and the higher grounds where we can deceive them.
3
Introduction:
Cybercrime is a type of crime or an illegal activity that is basically committed through a computer with the help of
networking.
The ideal or most familiar word for this would be "Hacking".
Following are the examples of cybercrime.
1) Internet Fraud.
2) Spams.
3) Cyberbullying.
4) Gathering Information Illegally.
5) Identity Theft.
6) Phishing scams.
7) Hate Crimes.
Internet Fraud:
Whenever one tries to purchase a product from the internet, he/she is on a great risk of being victimized by internet
fraud. So, it is very important for a person to research and study the sources from which he/she is purchasing the
product. The e-commerce environment is stuffed with fake companies and organizations who distribute worst quality
products to the customers and are greatly involved in stealing customers bank account data. These Internet crimes
became a larger platform for crimes in the late 1990s and early 2000s. A single virus outbreak was blamed for 80$
Billion loss. In this scenario, HBL has introduced a 3-D secure e-commerce web certification which allows the user to
recognize websites that can be trusted for online shopping. There are some famous websites which could be trusted
on the basis of current circumstances for online shopping.Some of the trustworthy websites are given below:
1) www.daraz.pk
2) www.kaymu.pk
3) www.amazon.com
4) www.alibaba.com
5) www.microsoft.com
Cyberbullying.
Cyberbullying is done through digital devices for example Cell Phones, Computers, Tablets, iPhone, Ipads etc
Mentally torturing, harassment, Humiliation is cyberbullying. It includes sending, posting or sharing taunting, offending
and sexual contents "publicly" or sending it to a specific person. The content could be personal data like pictures,
email, chats etc.
Platforms for cyberbullying are given below:
1) Social Media such as Facebook, Twitter, Snapchat, Instagram.
3) Mobile Messaging.
80% teenagers use cell phones and some other related devices and 20% of them are bullied on daily basis.
4
Phishing scams:
This is an attempt to gather users password and sensitive information by generating and disguising a fake webpage of
an authentic website. When a user comes across this kind of fake webpage he inputs his personal data in the sign in
or sign up form resulting in stolen data of the user.
Cyber Criminals :
Someone who penetrates and breaks the security system of an organization or a network and exploits the flaws in
that computer system is known as Hacker and process is known as Hacking.
There are many types of hackers.
1) Script Kiddie.
2) White Hat Hackers
3) Grey Hat Hackers
4) Black Hat Hackers
5) Green Hat Hackers
6) Red Hat Hackers
7) Blue Hat Hackers
But main of them are Blackhat, White hat and grey hat.
Script Kiddie:
Basically, they cannot be called hackers, because they just copy some kind of coded script and use it as a virus or use
predefined software like maltego, hydra,Metasploit etc for penetration.
White Hat Hackers:
White hat hackers are known as Ethical Hacker or Legal Hackers. These type of hackers help organizations to make
their system secure or they help victim company to prevent the viruses. White Hat Hackers are certified to hack.
Black Hat Hackers:
Blackhat hackers are famous as "Crackers" .They find companies, organizations, especially bank that have weak and
small security system and when they find it they steal the money, credit card information and etc
Gray Hat Hackers:
They are nor Ethical Hackers neither Unethical Hackers. They don't harm people with their hacking nor steal anything,
like money or personal information but sometimes they try to penetrate into a system.
Green Hat Hackers:
Green Hat Hackers are types of hackers that really love hacking and care about it .They are unlike script-kiddies and
they work hard and strive and struggle to become a legendary hacker.
Red Hat Hackers:
Red Hat Hackers are the wanted criminals of the world. They steal money, steal data, harm the computer system,
sometimes leaks the information to the outer world .It may include Terrorist.
5
History of Cyber Attacks:
In February 2000. DDoS flooded Yahoo, eBay, CNN and ZDNet with huge data, blocking access for thousands of users
for two to three hours.
Love Letter virus struck companies worldwide in May the same year, flooding e-mail servers and causing them to
crash as it spreads.
1994:
A hacker known as Merc manages to dial into a server at the Salt River Project and explores computers used to monitor
canals in the Phoenix region.
1988:
"Robert Morris" released a worm that infected around 3,000 to 4,000 of the Internet's approximately servers.
WannaCry ransomware attack was a May 2017 global cyber offence
Which targeted computers running Microsoft Windows operating systems. Their sole objective was to encrypt whole
computers data and then demanded ransom for the decryption keys.
Cyber Warfare:
Cyber warfare is a modern form of warfare in which countries attack each other for proving their strength or for gaining
political/foreign policy victories.
Cyber warfare is an important evolutionary addition in the battle fronts that has the potential for significant effect on
the citizens and especially on the computer scientists of the world.
Cyber warfare may be used as a political tool to increase the control of the government on the citizens and different
organizations by keeping in checking their data and resources. Some of the techniques of the cyber-attacks include
breaking into someone's personal computer or servers.
Cyber warfare became elite warfare when In the last United States elections Russian government Hacked into the
election and moulded the results whatever they wanted it to be. This created a mass tension around the globe as it
was one of the most powerful and unique display of power by one of the Superpower.
Another tactic is to create hindrance in the functionality of computers and the embedded equipment by using worms
and viruses. In addition, some hackers use logic bombs and some other malware to malfunction the computer
networks of important facilities.
The main scope and platform for the cyber warfare is internet and local network with a strong help from the ruling
Government as generally they are the master planner of the attacks.
Because of increasing Cybercrimes and warfare around the globe and also because of some political reasons The
Pakistani Government has also passed a Cyber Crime Bill which was targeted frequently by the critics.
Some of the salient features of the Pakistans Cyber Crime bill are mentioned below:
1) Up to 3 years imprisonment, Rs1 million fine or both for unauthorised access to critical Network system or data.
2) The government will cooperate with any foreign agency investigating about Cyber Criminals residing in the authority
of Pakistan.
3) Rs5 million fine, Up to three years imprisonment or both for breaching and using an individual Identity and crucial
data without authorization.
6
4) If anyone's information has been used intentionally or without authorization he/she can report it 24/7 to the Cyber
Security department of FIA.
Resources and the techniques used for Cyber Crimes:
There are many resources but we will only discuss about most popular of them. Kali linux is the operating system and
python is the programming language which is widely used by the network penetrators.
Techniques used by hackers :
Brute force attack: In this technique, all possible combinations of the password are applied in order to find the
correct combination.
Dictionary attack: Common dictionary words are used For predicting password.
Waterhole attacks: When the objective of the hacker is to gather as many sensitive information as he can they target
public places like internet café, coffee shops or other most visited public places.
Fake wifi points: They can create fake wifi points in order to grab the sensitive data of the user who tries to log in from
the wifi.
Backdoors: The points from which they penetrate into a system is known as the backdoor.
Usage of proxy networks for defence: Universities and institutions use proxy servers in order to defend their user
from being attacked. This proxy network changes the IP address of their traffic who are accessing the internet so that
a foreigner whose intentions are bad fails in tracking the genuine IP address of their member.
DDOS Attack stands for distributed denial of service attack. In this, the victim is attacked from different sources. This
makes it very difficult to defend the network from the attack.
Hackers point out bugs in the system of the targeted computer and then manipulate that weak point of the system
in order to get access to the pc/network. This mainly happens when OS update is released but the targeted pc has not
updated yet which leaves that bug unresolved and prove as an open attack on people like black hat hackers. That's
the reason why our windows always recommend us to always turn on the automatic updates.
The internet as a whole consist of three layers world wide web, deep web and dark web. Worldwide is the portion of
internet consisting google search engine and the whole social media and many more websites. There are other
different websites which our search engines cannot access therefore we can call them hidden or the webs which can
be accessed via password or authorization. Which can only be logged in by using genuine authorization these are the
deep web content that won't show up on our common search engine.
The other one is dark web which is quite popular in the underworld of criminals and unethical hackers. Dark web is
part of worldwide that require a special browser to access.
The dark web is also called "Onionland" because of its content accessible only using services like Tor. It can be identified
by the domain ".onion" whereas other normal websites identified by the domain .com.
The darkweb is used for illegal activities such as drug trade, media and confidential information exchange also for
pedophiles and terrorists who want to hide their illegal activities use the dark web. People who want to hide their
identity and want to search illegal articles use the dark web. Dark web is notorious for being the base of all cyber
crimes.
7
About Tor Browser :
Tor is a web browser or an internet networking protocol which is used commonly to reach Dark web and also to
anonymize the data relayed to across it. Torr makes it difficult for anyone to track the internet activity of the user.By
using it trackers may face a lot of hindrances in order to track and analyse users IP address .When someone runs tor
online data collectors such as Google Ads and little known but powerful Crawlers will not be able to gather your data.
Conclusions:
Security is an illusion: Whatever technique we use to secure our networks it will be defeated in any time soon.
This cycle keeps on running until meaning of security loses it's worth.
develop best security practices:
People believe that security is an illusion but we can do much more to give them a tough time.Technology tycoons like
Facebook have thousands of their employees dedicated to the Cybersecurity wing. Which allows their customers to
trust them .The ones who know how to penetrate can also secure our networks as they know what a hacker looks for
before penetrating into a system.
Be proactive:
Do not wait until your networks are doomed in one way or another .Use every possible defence techniques which
cannot be deceived by the hackers.
Strict cyber laws should be deployed: Maximum people out there think we cannot/should not categorize Cyber
Crimes into regular crimes. But as the events are happening and the world has started facing heavy losses because of
cybercrimes it is becoming more and more clear that introducing strict cyber laws is the only way to handle these
activities.
Increase security awareness among the masses: Most of the people do not give much more important
to their data and they also imagine no one can really hurt them by grabbing their data but ironically the reality is
opposite. Being tech people we have a responsibility to create awareness among the masses about the dark side of
the cyber ecosystem.
8
REFERNCE:
https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-2016-hate-crime-statistics
http://www.encyclopedia.com/science-and-technology/computers-and-electrical-engineering/computers-
and-computing/internet-fraud
https://www.cybrary.it/0p3n/types-of-hackers/
https://www.cia.gov/library/publications/the-world-factbook/geos/en.html
http://www.state.gov/r/pa/ei/bgn/5377.htm
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5634434
http://www.stratcom.mil/factsheets/cyber_command/

Weitere ähnliche Inhalte

Was ist angesagt?

Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Phishing
PhishingPhishing
PhishingHHSome
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptxVivek Chauhan
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 

Was ist angesagt? (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Haking PPT
Haking PPTHaking PPT
Haking PPT
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Incident response process
Incident response processIncident response process
Incident response process
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
IT security
IT securityIT security
IT security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Malware
MalwareMalware
Malware
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
 
Hacking
HackingHacking
Hacking
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 

Ähnlich wie Cybercrime Analysis: Deceiving Criminals

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 

Ähnlich wie Cybercrime Analysis: Deceiving Criminals (20)

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 

Kürzlich hochgeladen

Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxnoorehahmad
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.KathleenAnnCordero2
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGYpruthirajnayak525
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸mathanramanathan2005
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Escort Service
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...Henrik Hanke
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this periodSaraIsabelJimenez
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 

Kürzlich hochgeladen (20)

Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptxAnne Frank A Beacon of Hope amidst darkness ppt.pptx
Anne Frank A Beacon of Hope amidst darkness ppt.pptx
 
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
PAG-UNLAD NG EKONOMIYA na dapat isaalang alang sa pag-aaral.
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC  - NANOTECHNOLOGYPHYSICS PROJECT BY MSC  - NANOTECHNOLOGY
PHYSICS PROJECT BY MSC - NANOTECHNOLOGY
 
Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸Mathan flower ppt.pptx slide orchids ✨🌸
Mathan flower ppt.pptx slide orchids ✨🌸
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170Call Girls In Aerocity 🤳 Call Us +919599264170
Call Girls In Aerocity 🤳 Call Us +919599264170
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
DGT @ CTAC 2024 Valencia: Most crucial invest to digitalisation_Sven Zoelle_v...
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this period
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 

Cybercrime Analysis: Deceiving Criminals

  • 1. 1
  • 2. 2 Abstract: Being one of the most rapidly expanding sector, internet has become one of the most vital part of our life from work to entertainment there's no other option now but it comes with a price of our privacy. Cyber Crimes are also on the rapid expansion causing our sensitive data to be used without our permission. Governments are aware of this matter doing everything they can to secure our networks but many say security is just an illusion. In this whole report we will analyse the strength of the people who are trying to spoil the Cyber Ecosystem and the higher grounds where we can deceive them.
  • 3. 3 Introduction: Cybercrime is a type of crime or an illegal activity that is basically committed through a computer with the help of networking. The ideal or most familiar word for this would be "Hacking". Following are the examples of cybercrime. 1) Internet Fraud. 2) Spams. 3) Cyberbullying. 4) Gathering Information Illegally. 5) Identity Theft. 6) Phishing scams. 7) Hate Crimes. Internet Fraud: Whenever one tries to purchase a product from the internet, he/she is on a great risk of being victimized by internet fraud. So, it is very important for a person to research and study the sources from which he/she is purchasing the product. The e-commerce environment is stuffed with fake companies and organizations who distribute worst quality products to the customers and are greatly involved in stealing customers bank account data. These Internet crimes became a larger platform for crimes in the late 1990s and early 2000s. A single virus outbreak was blamed for 80$ Billion loss. In this scenario, HBL has introduced a 3-D secure e-commerce web certification which allows the user to recognize websites that can be trusted for online shopping. There are some famous websites which could be trusted on the basis of current circumstances for online shopping.Some of the trustworthy websites are given below: 1) www.daraz.pk 2) www.kaymu.pk 3) www.amazon.com 4) www.alibaba.com 5) www.microsoft.com Cyberbullying. Cyberbullying is done through digital devices for example Cell Phones, Computers, Tablets, iPhone, Ipads etc Mentally torturing, harassment, Humiliation is cyberbullying. It includes sending, posting or sharing taunting, offending and sexual contents "publicly" or sending it to a specific person. The content could be personal data like pictures, email, chats etc. Platforms for cyberbullying are given below: 1) Social Media such as Facebook, Twitter, Snapchat, Instagram. 3) Mobile Messaging. 80% teenagers use cell phones and some other related devices and 20% of them are bullied on daily basis.
  • 4. 4 Phishing scams: This is an attempt to gather users password and sensitive information by generating and disguising a fake webpage of an authentic website. When a user comes across this kind of fake webpage he inputs his personal data in the sign in or sign up form resulting in stolen data of the user. Cyber Criminals : Someone who penetrates and breaks the security system of an organization or a network and exploits the flaws in that computer system is known as Hacker and process is known as Hacking. There are many types of hackers. 1) Script Kiddie. 2) White Hat Hackers 3) Grey Hat Hackers 4) Black Hat Hackers 5) Green Hat Hackers 6) Red Hat Hackers 7) Blue Hat Hackers But main of them are Blackhat, White hat and grey hat. Script Kiddie: Basically, they cannot be called hackers, because they just copy some kind of coded script and use it as a virus or use predefined software like maltego, hydra,Metasploit etc for penetration. White Hat Hackers: White hat hackers are known as Ethical Hacker or Legal Hackers. These type of hackers help organizations to make their system secure or they help victim company to prevent the viruses. White Hat Hackers are certified to hack. Black Hat Hackers: Blackhat hackers are famous as "Crackers" .They find companies, organizations, especially bank that have weak and small security system and when they find it they steal the money, credit card information and etc Gray Hat Hackers: They are nor Ethical Hackers neither Unethical Hackers. They don't harm people with their hacking nor steal anything, like money or personal information but sometimes they try to penetrate into a system. Green Hat Hackers: Green Hat Hackers are types of hackers that really love hacking and care about it .They are unlike script-kiddies and they work hard and strive and struggle to become a legendary hacker. Red Hat Hackers: Red Hat Hackers are the wanted criminals of the world. They steal money, steal data, harm the computer system, sometimes leaks the information to the outer world .It may include Terrorist.
  • 5. 5 History of Cyber Attacks: In February 2000. DDoS flooded Yahoo, eBay, CNN and ZDNet with huge data, blocking access for thousands of users for two to three hours. Love Letter virus struck companies worldwide in May the same year, flooding e-mail servers and causing them to crash as it spreads. 1994: A hacker known as Merc manages to dial into a server at the Salt River Project and explores computers used to monitor canals in the Phoenix region. 1988: "Robert Morris" released a worm that infected around 3,000 to 4,000 of the Internet's approximately servers. WannaCry ransomware attack was a May 2017 global cyber offence Which targeted computers running Microsoft Windows operating systems. Their sole objective was to encrypt whole computers data and then demanded ransom for the decryption keys. Cyber Warfare: Cyber warfare is a modern form of warfare in which countries attack each other for proving their strength or for gaining political/foreign policy victories. Cyber warfare is an important evolutionary addition in the battle fronts that has the potential for significant effect on the citizens and especially on the computer scientists of the world. Cyber warfare may be used as a political tool to increase the control of the government on the citizens and different organizations by keeping in checking their data and resources. Some of the techniques of the cyber-attacks include breaking into someone's personal computer or servers. Cyber warfare became elite warfare when In the last United States elections Russian government Hacked into the election and moulded the results whatever they wanted it to be. This created a mass tension around the globe as it was one of the most powerful and unique display of power by one of the Superpower. Another tactic is to create hindrance in the functionality of computers and the embedded equipment by using worms and viruses. In addition, some hackers use logic bombs and some other malware to malfunction the computer networks of important facilities. The main scope and platform for the cyber warfare is internet and local network with a strong help from the ruling Government as generally they are the master planner of the attacks. Because of increasing Cybercrimes and warfare around the globe and also because of some political reasons The Pakistani Government has also passed a Cyber Crime Bill which was targeted frequently by the critics. Some of the salient features of the Pakistans Cyber Crime bill are mentioned below: 1) Up to 3 years imprisonment, Rs1 million fine or both for unauthorised access to critical Network system or data. 2) The government will cooperate with any foreign agency investigating about Cyber Criminals residing in the authority of Pakistan. 3) Rs5 million fine, Up to three years imprisonment or both for breaching and using an individual Identity and crucial data without authorization.
  • 6. 6 4) If anyone's information has been used intentionally or without authorization he/she can report it 24/7 to the Cyber Security department of FIA. Resources and the techniques used for Cyber Crimes: There are many resources but we will only discuss about most popular of them. Kali linux is the operating system and python is the programming language which is widely used by the network penetrators. Techniques used by hackers : Brute force attack: In this technique, all possible combinations of the password are applied in order to find the correct combination. Dictionary attack: Common dictionary words are used For predicting password. Waterhole attacks: When the objective of the hacker is to gather as many sensitive information as he can they target public places like internet café, coffee shops or other most visited public places. Fake wifi points: They can create fake wifi points in order to grab the sensitive data of the user who tries to log in from the wifi. Backdoors: The points from which they penetrate into a system is known as the backdoor. Usage of proxy networks for defence: Universities and institutions use proxy servers in order to defend their user from being attacked. This proxy network changes the IP address of their traffic who are accessing the internet so that a foreigner whose intentions are bad fails in tracking the genuine IP address of their member. DDOS Attack stands for distributed denial of service attack. In this, the victim is attacked from different sources. This makes it very difficult to defend the network from the attack. Hackers point out bugs in the system of the targeted computer and then manipulate that weak point of the system in order to get access to the pc/network. This mainly happens when OS update is released but the targeted pc has not updated yet which leaves that bug unresolved and prove as an open attack on people like black hat hackers. That's the reason why our windows always recommend us to always turn on the automatic updates. The internet as a whole consist of three layers world wide web, deep web and dark web. Worldwide is the portion of internet consisting google search engine and the whole social media and many more websites. There are other different websites which our search engines cannot access therefore we can call them hidden or the webs which can be accessed via password or authorization. Which can only be logged in by using genuine authorization these are the deep web content that won't show up on our common search engine. The other one is dark web which is quite popular in the underworld of criminals and unethical hackers. Dark web is part of worldwide that require a special browser to access. The dark web is also called "Onionland" because of its content accessible only using services like Tor. It can be identified by the domain ".onion" whereas other normal websites identified by the domain .com. The darkweb is used for illegal activities such as drug trade, media and confidential information exchange also for pedophiles and terrorists who want to hide their illegal activities use the dark web. People who want to hide their identity and want to search illegal articles use the dark web. Dark web is notorious for being the base of all cyber crimes.
  • 7. 7 About Tor Browser : Tor is a web browser or an internet networking protocol which is used commonly to reach Dark web and also to anonymize the data relayed to across it. Torr makes it difficult for anyone to track the internet activity of the user.By using it trackers may face a lot of hindrances in order to track and analyse users IP address .When someone runs tor online data collectors such as Google Ads and little known but powerful Crawlers will not be able to gather your data. Conclusions: Security is an illusion: Whatever technique we use to secure our networks it will be defeated in any time soon. This cycle keeps on running until meaning of security loses it's worth. develop best security practices: People believe that security is an illusion but we can do much more to give them a tough time.Technology tycoons like Facebook have thousands of their employees dedicated to the Cybersecurity wing. Which allows their customers to trust them .The ones who know how to penetrate can also secure our networks as they know what a hacker looks for before penetrating into a system. Be proactive: Do not wait until your networks are doomed in one way or another .Use every possible defence techniques which cannot be deceived by the hackers. Strict cyber laws should be deployed: Maximum people out there think we cannot/should not categorize Cyber Crimes into regular crimes. But as the events are happening and the world has started facing heavy losses because of cybercrimes it is becoming more and more clear that introducing strict cyber laws is the only way to handle these activities. Increase security awareness among the masses: Most of the people do not give much more important to their data and they also imagine no one can really hurt them by grabbing their data but ironically the reality is opposite. Being tech people we have a responsibility to create awareness among the masses about the dark side of the cyber ecosystem.