SlideShare a Scribd company logo
1 of 39
Introduction to Cyber crime and 
Cyber Security 
Prepared By:- 
KAUSHAL SOLANKI
Definition of a computer crime 
โ€ข All crimes performed or resorted to by abuse 
of electronic media or otherwise, with the 
purpose of influencing the functioning of 
computer or computer system 
โ€ข Computer crime is when 
โ€“ Computer is a target 
โ€“ Computer is a tool for the crime 
โ€“ Computer is incidental to a crime
TThhee UUssuuaall SSuussppeeccttss 
โ€ข Disgruntled employees 
โ€ข Teenagers 
โ€ข Political activist 
โ€ข Professional Hackers 
โ€ข Business Rival 
โ€ข Ex wife or husband/BF or GF
โ€ข Gullible 
โ€ข Greedy people 
โ€ข Unskilled and Inexperienced 
โ€ข Trusting People 
โ€ข Unlucky people
โ€ข Anonymity 
โ€ข Computerโ€™s storage capacity 
โ€ข Weakness in operating system 
โ€ข Lack of Awareness from user
Different types ooff Cyber Crimes 
โ€ข Hacking 
โ€ข Denial of service attack 
โ€ข Virus dissemination 
โ€ข Software Piracy 
โ€ข Pornography 
โ€ข IRC Crimes 
โ€ข Credit Card Fraud 
โ€ข NET Extortion 
โ€ข Phishing 
โ€ข Spoofing 
โ€ข Cyber Stalking 
โ€ข Cyber Defamation 
โ€ข Threatening 
โ€ข Salami Attack
โ€ข Hacking: Illegal intrusion into a computer 
system without the permission of the 
computer owner/user
Denial of Service Attack 
โ€ข An act by the criminal, who floods the 
bandwidth of the victimโ€™s network or fills their 
e-mail box with spam mail depriving him of 
the services he is entitled to access or provide
โ€ข Malicious software that attaches itself to 
other software. 
โ€ข (Virus, Worms, Trojan Horse, Time Bomb, 
Logic Bomb)
Software Piracy 
โ€ข Theft of Software through the illegal copying 
of genuine programs or the counterfeiting and 
distribution of products intended to pass for 
the original 
โ€“ Examples(Pirate Bay, Bootlegs, etc) 
โ€“ End user copying, Downloads
PPeeddoopphhiilleess 
โ€ข Internet allows them to 
โ€“ Instant access to other predators worldwide; 
โ€“ Open discussion with children 
โ€“ Support from other pedophiles 
โ€“ Disguise their identities
Pedophiles 
โ€ข Pedophile organizations include 
โ€ข โ€“ NAMBLA (The North American Man-Boy Love 
Association) and 
โ€ข โ€“ PAN (Pedophile Alert Network) in the Netherlands. 
โ€ข โ€“ Members receive monthly magazines and 
newsletters that include seduction techniques and 
advice on avoiding detection and prosecution. 
Pedophiles meet each other via the Internet where 
they swap methods, success stories, even names, 
descriptions, and images of children.
Internet Relay Chat (IRC) servers have chat rooms in 
which people from anywhere the world can come 
together and chat with each other 
โ€ข Criminals use it for meeting coconspirators. 
โ€ข Hackers use it for discussing their exploits / sharing the 
techniques 
โ€ข Pedophiles use chat rooms to allure small children 
โ€ข Cyber Stalking - In order to harass a woman her 
telephone number is given to others as if she wants to 
befriend males
Credit Card Fraud 
โ€ข If electronic transactions are not secured the 
credit card numbers can be stolen by the 
hackers who can misuse this card by 
impersonating the credit card owner
โ€ข Copying the companyโ€™s confidential data in 
order to extort the company for a huge 
amount
โ€ข A technique of pulling out confidential 
information from the bank/financial accounts 
by deceptive means
EX: of Phishing Email 
From: *****Bank [mailto:support@****Bank.com] 
Sent: 08 June 2004 03:25 
To: India 
Subject: Official information from ***** Bank 
Dear valued ***** Bank Customer! 
For security purposes your account has been 
randomly chosen for verification. To verify 
your account information we are asking you to 
provide us with all the data we are requesting. 
Otherwise we will not be able to verify your identity 
and access to your account will be denied. Please click 
on the link below to get to the bank secure 
page and verify your account details. Thank you. 
https://infinity.*****bank.co.in/Verify.jsp 
****** Bank Limited
โ€ข Getting one Computer on the network to 
pretend to have the identity of another 
computer, usually one with special access 
privileges, so as to obtain access to the other 
computers on the network.
โ€ข The criminal follows the victim by sending 
emails, entering the chat rooms as the person 
being stalked frequently
โ€ข The Criminal sends emails containing 
defamatory matters to all concerned off the 
victim or post the defamatory matters on a 
website.. 
โ€ข (disgruntled employee may do this against 
boss,, ex-boys friend against girl,, divorced 
husband against wife etc)
โ€ข The criminal sends threatening email or 
comes in contact in the chat rooms with 
victim 
โ€ข (Anyone disgruntled may do this against boss, 
friend or official)
SSaallaammii AAttttaacckk 
โ€ข In such crime criminal makes insignificant 
changes in such a manner that such changes 
would go unnoticed. 
โ€ข Criminal makes such program that deducts small 
amount like Rs. 2.50 per month from the account 
of all the customer of the Bank and deposit the 
same in his account. In this case no account 
holder will approach the bank for such small 
amount but criminal gains huge amount.
Sale of Narcotics 
โ€ข Sale and Purchase through the net 
โ€ข Websites offer sales and shipment of 
contraband drugs 
โ€ข May use hidden messages to sell the drugs
WHAT IS CYBER-SAFETY? 
26 
What 
isโ€ฆ 
๏‚ง Cyber-safety is a common term 
used to describe a set of practices, 
measures and/or actions you can 
take to protect personal information 
and your computer from attacks.
TOP FIVE CYBER-SAFETY ACTIONS 
Additional information about each of the actions below is provided on slides 8-14. Faculty 
and staff should work with their technical support coordinator before implementing these 
measures. 
27 
1. Run Anti-virus Software 
2. Prevent Identity Theft 
3. Turn on Personal Firewalls 
4. Protect Passwords 
5. Back up Important Files
RUN ANTI-VIRUS SOFTWARE 
๏‚ง To avoid computer problems caused by viruses, install and run an anti-virus 
program. 
๏‚ง Periodically, check to see if your anti-virus is up to date by opening your anti-virus 
28 
program and checking the Last updated: date. 
๏‚ง Anti-virus software removes viruses, quarantines and repairs infected files, 
and can help prevent future viruses.
PREVENT IDENTITY THEFT 
29 
๏‚ง Don't give out financial account numbers, Social Security 
numbers, driverโ€™s license numbers or other personal 
identity information unless you know exactly who's 
receiving it. Protect others peopleโ€™s information as you 
would your own. 
๏‚ง Never send personal or confidential information via email 
or instant messages as these can be easily intercepted.
TURN ON PERSONAL 
FIREWALLS 
๏‚ง Check your computer's security settings for a built-in personal firewall. If you 
have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls 
๏‚ง Firewalls act as protective barriers between computers and the internet. 
๏‚ง Hackers search the Internet by sending out pings (calls) to random 
computers and wait for responses. Firewalls prevent your computer from 
responding to these calls. 
30
PROTECT PASSWORDS 
๏‚ง Do not share your passwords, and always make new passwords difficult to 
guess by avoiding dictionary words, and mixing letters, numbers and 
punctuation. 
๏‚ง Do not use one of these common passwords or any variation of them: qwerty1, 
abc123, letmein, password1, iloveyou1, (yourname1), baseball1. 
๏‚ง Change your passwords periodically. 
๏‚ง When choosing a password: 
31 
o Mix upper and lower case letters 
o Use a minimum of 8 characters 
o Use mnemonics to help you remember a difficult password
BACK UP IMPORTANT FILES 
๏‚ง Reduce your risk of losing important files to a virus, computer crash, theft or 
disaster by creating back-up copies. 
๏‚ง Keep your critical files in one place on your computerโ€™s hard drive so you can 
easily create a back up copy. 
๏‚ง Save copies of your important documents and files to a CD, online back up 
service, flash or USB drive, or a server. 
๏‚ง Store your back-up media in a secure place away from your computer, in 
case of fire or theft. 
๏‚ง Test your back up media periodically to make sure the files are accessible 
and readable. 
32
CYBER-SAFETY AT HOME 
๏‚ง Avoid leaving your laptop unsupervised and in plain view in the 
library or coffee house, or in your car, dorm room or home. 
๏‚ง Set up a user account and password to prevent unauthorized access 
to your computer files. 
๏‚ง Do not install unnecessary programs on your computer. 
33 
Home
CYBER-SAFETY AT WORK 
๏‚ง Be sure to work with your technical support coordinator before implementing 
new cyber-safety measures. 
๏‚ง Talk with your technical support coordinator about what cyber-safety 
measures are in place in your department. 
๏‚ง Do not install unnecessary programs on your work computer. 
34 
Work
โ€ข vlc-record-2014-09-22-22h25m35s-Facts+about+
IT ACT PROVISIONS 
โ€ข email would now be a valid and legal form of 
communication in our country that can be duly 
produced and approved in a court of law. 
โ€ข Companies shall now be able to carry out electronic 
commerce using the legal infrastructure provided 
by the Act. 
โ€ข Digital signatures have been given legal validity and 
sanction in the Act.
IT ACT PROVISIONS 
โ€ข The Act now allows Government to issue 
notification on the web thus heralding e-governance 
โ€ข statutory remedy in case if anyone breaks 
into companies computer systems or 
network and causes damages or copies data
Cyber crime and cyber security
Cyber crime and cyber security

More Related Content

What's hot

CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY Ashish prashar
ย 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
ย 
Cybersecurity
CybersecurityCybersecurity
CybersecurityForam Gosai
ย 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
ย 
cyber security
cyber security cyber security
cyber security NiharikaVoleti
ย 
cyber security
cyber securitycyber security
cyber securityabithajayavel
ย 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
ย 
Cybersecurity
CybersecurityCybersecurity
CybersecurityANGIEPAEZ304
ย 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
ย 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
ย 
Cyber security
Cyber securityCyber security
Cyber securityDebaroy1995
ย 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
ย 
cyber crime
cyber crimecyber crime
cyber crimeSaba MuShtaq
ย 

What's hot (20)

CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
cyber security
cyber security cyber security
cyber security
ย 
cyber security
cyber securitycyber security
cyber security
ย 
Cyber crime
Cyber crimeCyber crime
Cyber crime
ย 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
ย 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
ย 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
ย 
cyber security
cyber securitycyber security
cyber security
ย 
cyber crime
cyber crimecyber crime
cyber crime
ย 

Viewers also liked

introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityErdo Deshiant Garnaby
ย 
Cyber security
Cyber security        Cyber security
Cyber security Shubhamlohiya
ย 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
ย 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
ย 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
ย 

Viewers also liked (6)

introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
ย 
Cyber security
Cyber security        Cyber security
Cyber security
ย 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
ย 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
ย 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
ย 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
ย 

Similar to Cyber crime and cyber security

E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
ย 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
ย 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
ย 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptxbcanawakadalcollege
ย 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityAdeel Younas
ย 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
ย 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptxSonakshiMundra
ย 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From CybercrimeDavid J Rosenthal
ย 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
ย 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptxMeesanRaza
ย 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldExpeed Software
ย 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
ย 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Tanvi Jindal
ย 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
ย 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
ย 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
ย 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraudKarmaveersinghsankhl
ย 

Similar to Cyber crime and cyber security (20)

E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
ย 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
ย 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
ย 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
ย 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
ย 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
ย 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
ย 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
ย 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
ย 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
ย 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
ย 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
ย 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
ย 
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)Smart-phone-with-Chains-PowerPoint-Widescreen (1)
Smart-phone-with-Chains-PowerPoint-Widescreen (1)
ย 
Internet Security
Internet SecurityInternet Security
Internet Security
ย 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
ย 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
ย 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
ย 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
ย 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
ย 

Recently uploaded

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLimonikaupta
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
ย 
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...nirzagarg
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...nilamkumrai
ย 

Recently uploaded (20)

2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
ย 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
ย 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
๐Ÿ“ฑDehradun Call Girls Service ๐Ÿ“ฑโ˜Ž๏ธ +91'905,3900,678 โ˜Ž๏ธ๐Ÿ“ฑ Call Girls In Dehradun ๐Ÿ“ฑ
ย 
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men  ๐Ÿ”mehsana๐Ÿ”   Escorts...
โžฅ๐Ÿ” 7737669865 ๐Ÿ”โ–ป mehsana Call-girls in Women Seeking Men ๐Ÿ”mehsana๐Ÿ” Escorts...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls ๐ŸŽ—๏ธ 9352988975 Sizzling | Escorts | G...
ย 

Cyber crime and cyber security

  • 1. Introduction to Cyber crime and Cyber Security Prepared By:- KAUSHAL SOLANKI
  • 2.
  • 3. Definition of a computer crime โ€ข All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system โ€ข Computer crime is when โ€“ Computer is a target โ€“ Computer is a tool for the crime โ€“ Computer is incidental to a crime
  • 4. TThhee UUssuuaall SSuussppeeccttss โ€ข Disgruntled employees โ€ข Teenagers โ€ข Political activist โ€ข Professional Hackers โ€ข Business Rival โ€ข Ex wife or husband/BF or GF
  • 5. โ€ข Gullible โ€ข Greedy people โ€ข Unskilled and Inexperienced โ€ข Trusting People โ€ข Unlucky people
  • 6. โ€ข Anonymity โ€ข Computerโ€™s storage capacity โ€ข Weakness in operating system โ€ข Lack of Awareness from user
  • 7. Different types ooff Cyber Crimes โ€ข Hacking โ€ข Denial of service attack โ€ข Virus dissemination โ€ข Software Piracy โ€ข Pornography โ€ข IRC Crimes โ€ข Credit Card Fraud โ€ข NET Extortion โ€ข Phishing โ€ข Spoofing โ€ข Cyber Stalking โ€ข Cyber Defamation โ€ข Threatening โ€ข Salami Attack
  • 8. โ€ข Hacking: Illegal intrusion into a computer system without the permission of the computer owner/user
  • 9. Denial of Service Attack โ€ข An act by the criminal, who floods the bandwidth of the victimโ€™s network or fills their e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 10. โ€ข Malicious software that attaches itself to other software. โ€ข (Virus, Worms, Trojan Horse, Time Bomb, Logic Bomb)
  • 11. Software Piracy โ€ข Theft of Software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original โ€“ Examples(Pirate Bay, Bootlegs, etc) โ€“ End user copying, Downloads
  • 12. PPeeddoopphhiilleess โ€ข Internet allows them to โ€“ Instant access to other predators worldwide; โ€“ Open discussion with children โ€“ Support from other pedophiles โ€“ Disguise their identities
  • 13. Pedophiles โ€ข Pedophile organizations include โ€ข โ€“ NAMBLA (The North American Man-Boy Love Association) and โ€ข โ€“ PAN (Pedophile Alert Network) in the Netherlands. โ€ข โ€“ Members receive monthly magazines and newsletters that include seduction techniques and advice on avoiding detection and prosecution. Pedophiles meet each other via the Internet where they swap methods, success stories, even names, descriptions, and images of children.
  • 14. Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other โ€ข Criminals use it for meeting coconspirators. โ€ข Hackers use it for discussing their exploits / sharing the techniques โ€ข Pedophiles use chat rooms to allure small children โ€ข Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 15. Credit Card Fraud โ€ข If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 16. โ€ข Copying the companyโ€™s confidential data in order to extort the company for a huge amount
  • 17. โ€ข A technique of pulling out confidential information from the bank/financial accounts by deceptive means
  • 18. EX: of Phishing Email From: *****Bank [mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. https://infinity.*****bank.co.in/Verify.jsp ****** Bank Limited
  • 19. โ€ข Getting one Computer on the network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 20. โ€ข The criminal follows the victim by sending emails, entering the chat rooms as the person being stalked frequently
  • 21. โ€ข The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website.. โ€ข (disgruntled employee may do this against boss,, ex-boys friend against girl,, divorced husband against wife etc)
  • 22. โ€ข The criminal sends threatening email or comes in contact in the chat rooms with victim โ€ข (Anyone disgruntled may do this against boss, friend or official)
  • 23. SSaallaammii AAttttaacckk โ€ข In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. โ€ข Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 24. Sale of Narcotics โ€ข Sale and Purchase through the net โ€ข Websites offer sales and shipment of contraband drugs โ€ข May use hidden messages to sell the drugs
  • 25.
  • 26. WHAT IS CYBER-SAFETY? 26 What isโ€ฆ ๏‚ง Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks.
  • 27. TOP FIVE CYBER-SAFETY ACTIONS Additional information about each of the actions below is provided on slides 8-14. Faculty and staff should work with their technical support coordinator before implementing these measures. 27 1. Run Anti-virus Software 2. Prevent Identity Theft 3. Turn on Personal Firewalls 4. Protect Passwords 5. Back up Important Files
  • 28. RUN ANTI-VIRUS SOFTWARE ๏‚ง To avoid computer problems caused by viruses, install and run an anti-virus program. ๏‚ง Periodically, check to see if your anti-virus is up to date by opening your anti-virus 28 program and checking the Last updated: date. ๏‚ง Anti-virus software removes viruses, quarantines and repairs infected files, and can help prevent future viruses.
  • 29. PREVENT IDENTITY THEFT 29 ๏‚ง Don't give out financial account numbers, Social Security numbers, driverโ€™s license numbers or other personal identity information unless you know exactly who's receiving it. Protect others peopleโ€™s information as you would your own. ๏‚ง Never send personal or confidential information via email or instant messages as these can be easily intercepted.
  • 30. TURN ON PERSONAL FIREWALLS ๏‚ง Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Vista and Mac OSX have built-in firewalls ๏‚ง Firewalls act as protective barriers between computers and the internet. ๏‚ง Hackers search the Internet by sending out pings (calls) to random computers and wait for responses. Firewalls prevent your computer from responding to these calls. 30
  • 31. PROTECT PASSWORDS ๏‚ง Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation. ๏‚ง Do not use one of these common passwords or any variation of them: qwerty1, abc123, letmein, password1, iloveyou1, (yourname1), baseball1. ๏‚ง Change your passwords periodically. ๏‚ง When choosing a password: 31 o Mix upper and lower case letters o Use a minimum of 8 characters o Use mnemonics to help you remember a difficult password
  • 32. BACK UP IMPORTANT FILES ๏‚ง Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies. ๏‚ง Keep your critical files in one place on your computerโ€™s hard drive so you can easily create a back up copy. ๏‚ง Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a server. ๏‚ง Store your back-up media in a secure place away from your computer, in case of fire or theft. ๏‚ง Test your back up media periodically to make sure the files are accessible and readable. 32
  • 33. CYBER-SAFETY AT HOME ๏‚ง Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, dorm room or home. ๏‚ง Set up a user account and password to prevent unauthorized access to your computer files. ๏‚ง Do not install unnecessary programs on your computer. 33 Home
  • 34. CYBER-SAFETY AT WORK ๏‚ง Be sure to work with your technical support coordinator before implementing new cyber-safety measures. ๏‚ง Talk with your technical support coordinator about what cyber-safety measures are in place in your department. ๏‚ง Do not install unnecessary programs on your work computer. 34 Work
  • 36. IT ACT PROVISIONS โ€ข email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. โ€ข Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. โ€ข Digital signatures have been given legal validity and sanction in the Act.
  • 37. IT ACT PROVISIONS โ€ข The Act now allows Government to issue notification on the web thus heralding e-governance โ€ข statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data