SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Copyright of Thinking Hut IT Solutions Pvt Ltd
Cyber Crime & Security
A Primer
Uday Bhaskarwar
thinkinghut@thinkinghut.com
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd4
What is Cyber Crime?
Computer as a Weapon Computer as a Target
A Crime that involves a Computer
Copyright of Thinking Hut IT Solutions Pvt Ltd
First Cyber Crime ~200
years back!!
• In 1820, Joseph-Marie
Jacquard, a
textile manufacturer in
France, produced the
loom. It allowed the
automation in the
weaving of fabrics. His
employees felt that
their traditional
employment was being
threatened. They
sabotaged the
machine to discourage
Jacquard.
The first spam in 1978
• The first spam email
took place in 1978
when it was sent out
over the Arpanet
The first virus in 1982
• The first virus was
installed on an Apple
computer in 1982
when a high school
student, Rich Skrenta,
developed the Elk
Cloner
How old is Cyber Crime?
Copyright of Thinking Hut IT Solutions Pvt Ltd6
How Big is Cyber Crime?
Computer as a Target
Copyright of Thinking Hut IT Solutions Pvt Ltd7
How Big is Cyber Crime?
Computer as a Target
Copyright of Thinking Hut IT Solutions Pvt Ltd
How Big is Cyber Crime?
Copyright of Thinking Hut IT Solutions Pvt Ltd9
Where do we stand?
Computer as a Target
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd11
Levels at which Cyber Crime is committed
Person
Organization
Nation
Copyright of Thinking Hut IT Solutions Pvt Ltd12
It’s just like any other crime…
Cyber
Criminals
Use Tools
&
Techniques
To commit
Cyber
Crimes
Copyright of Thinking Hut IT Solutions Pvt Ltd
Tools - Malicious Software or Malware
13
Ransomware
Copyright of Thinking Hut IT Solutions Pvt Ltd
Types of Cyber Crimes
14
Web Jacking
Copyright of Thinking Hut IT Solutions Pvt Ltd
Types of Cyber Crimes
15
Salami Slicing Computer Vandalism
Cyber Stalking
Data
Diddling
Copyright of Thinking Hut IT Solutions Pvt Ltd
Types of Cyber Crimes
16
Spamming Cyber Trafficking
Child Solicitation
Copyright of Thinking Hut IT Solutions Pvt Ltd
Technique - Phishing
17
Copyright of Thinking Hut IT Solutions Pvt Ltd
Technique - Vishing
18
Copyright of Thinking Hut IT Solutions Pvt Ltd
Technique - Smishing
19
Copyright of Thinking Hut IT Solutions Pvt Ltd
Security Threats in Mobiles
20
Vulnerable
Browser Exploits
WiFi Sniffing
Copyright of Thinking Hut IT Solutions Pvt Ltd
Some interesting Cyber Crimes / Criminals
21
Copyright of Thinking Hut IT Solutions Pvt Ltd
Why is it difficult to detect & crack Cyber Crime?
22
Can be executed remotely
International – difficult for law enforcement
Difficult to defend
Copyright of Thinking Hut IT Solutions Pvt Ltd
How worried should I be?
23
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DOs
24
Long Random String
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DOs
25
Delete Unnecessary Software
Type URLs directly into the address bar
Regularly check
financial
transactions
Register your e-mail and mobile number
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DON’Ts
26
Do not visit unknown websites
Refrain from clicking links
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DON’Ts
27
• Never reply to emails that seek personal information.
• Never respond to offers of money from abroad.
• Never respond to/ make remittances/ participate in schemes or
offers from unknown entities.
• Never reply to emails or SMS' claiming that the recipient has won a
substantial sum of money in an online lottery or promotion.
• Never fill out forms in email messages that ask for personal financial
information.
• Never click or forward links in an email, instant message, or chat
from unknown senders or if you suspect the authenticity of the
message.
• Never share confidential details like Card number, expiry date, CVV,
OTP, Password with anyone when you receive any unsolicited calls,
SMS, IVR or email.
Copyright of Thinking Hut IT Solutions Pvt Ltd
Remember…
Copyright of Thinking Hut IT Solutions Pvt Ltd
Final Thoughts…
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd
http://www.thinkinghut.com thinkinghut@thinkinghut.com +91-20-6900-0420; +91-89750-03910
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 

Was ist angesagt? (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Ähnlich wie Cyber Crime & Security

Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An IntroductionMukesh Tekwani
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 

Ähnlich wie Cyber Crime & Security (20)

Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An Introduction
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Computer crime
Computer crimeComputer crime
Computer crime
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Cyber Crime & Security

  • 1. Copyright of Thinking Hut IT Solutions Pvt Ltd Cyber Crime & Security A Primer Uday Bhaskarwar thinkinghut@thinkinghut.com
  • 2. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 3. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 4. Copyright of Thinking Hut IT Solutions Pvt Ltd4 What is Cyber Crime? Computer as a Weapon Computer as a Target A Crime that involves a Computer
  • 5. Copyright of Thinking Hut IT Solutions Pvt Ltd First Cyber Crime ~200 years back!! • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. It allowed the automation in the weaving of fabrics. His employees felt that their traditional employment was being threatened. They sabotaged the machine to discourage Jacquard. The first spam in 1978 • The first spam email took place in 1978 when it was sent out over the Arpanet The first virus in 1982 • The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk Cloner How old is Cyber Crime?
  • 6. Copyright of Thinking Hut IT Solutions Pvt Ltd6 How Big is Cyber Crime? Computer as a Target
  • 7. Copyright of Thinking Hut IT Solutions Pvt Ltd7 How Big is Cyber Crime? Computer as a Target
  • 8. Copyright of Thinking Hut IT Solutions Pvt Ltd How Big is Cyber Crime?
  • 9. Copyright of Thinking Hut IT Solutions Pvt Ltd9 Where do we stand? Computer as a Target
  • 10. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 11. Copyright of Thinking Hut IT Solutions Pvt Ltd11 Levels at which Cyber Crime is committed Person Organization Nation
  • 12. Copyright of Thinking Hut IT Solutions Pvt Ltd12 It’s just like any other crime… Cyber Criminals Use Tools & Techniques To commit Cyber Crimes
  • 13. Copyright of Thinking Hut IT Solutions Pvt Ltd Tools - Malicious Software or Malware 13 Ransomware
  • 14. Copyright of Thinking Hut IT Solutions Pvt Ltd Types of Cyber Crimes 14 Web Jacking
  • 15. Copyright of Thinking Hut IT Solutions Pvt Ltd Types of Cyber Crimes 15 Salami Slicing Computer Vandalism Cyber Stalking Data Diddling
  • 16. Copyright of Thinking Hut IT Solutions Pvt Ltd Types of Cyber Crimes 16 Spamming Cyber Trafficking Child Solicitation
  • 17. Copyright of Thinking Hut IT Solutions Pvt Ltd Technique - Phishing 17
  • 18. Copyright of Thinking Hut IT Solutions Pvt Ltd Technique - Vishing 18
  • 19. Copyright of Thinking Hut IT Solutions Pvt Ltd Technique - Smishing 19
  • 20. Copyright of Thinking Hut IT Solutions Pvt Ltd Security Threats in Mobiles 20 Vulnerable Browser Exploits WiFi Sniffing
  • 21. Copyright of Thinking Hut IT Solutions Pvt Ltd Some interesting Cyber Crimes / Criminals 21
  • 22. Copyright of Thinking Hut IT Solutions Pvt Ltd Why is it difficult to detect & crack Cyber Crime? 22 Can be executed remotely International – difficult for law enforcement Difficult to defend
  • 23. Copyright of Thinking Hut IT Solutions Pvt Ltd How worried should I be? 23
  • 24. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DOs 24 Long Random String
  • 25. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DOs 25 Delete Unnecessary Software Type URLs directly into the address bar Regularly check financial transactions Register your e-mail and mobile number
  • 26. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DON’Ts 26 Do not visit unknown websites Refrain from clicking links
  • 27. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DON’Ts 27 • Never reply to emails that seek personal information. • Never respond to offers of money from abroad. • Never respond to/ make remittances/ participate in schemes or offers from unknown entities. • Never reply to emails or SMS' claiming that the recipient has won a substantial sum of money in an online lottery or promotion. • Never fill out forms in email messages that ask for personal financial information. • Never click or forward links in an email, instant message, or chat from unknown senders or if you suspect the authenticity of the message. • Never share confidential details like Card number, expiry date, CVV, OTP, Password with anyone when you receive any unsolicited calls, SMS, IVR or email.
  • 28. Copyright of Thinking Hut IT Solutions Pvt Ltd Remember…
  • 29. Copyright of Thinking Hut IT Solutions Pvt Ltd Final Thoughts…
  • 30. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 31. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 32. Copyright of Thinking Hut IT Solutions Pvt Ltd http://www.thinkinghut.com thinkinghut@thinkinghut.com +91-20-6900-0420; +91-89750-03910 Thank You