Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Crimes.

Similar presentations


Presentation on theme: "Cyber Crimes."— Presentation transcript:

1 Cyber Crimes

2 Introduction Definition Types Classification
Cyber Crimes Introduction Definition Types Classification

3 Cyber Crimes Introduction: Definition:
Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime is nothing but where the computer used as an object or subject of crime Definition: Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission

4 Types Hacking Theft Cyber Stalking Identity Theft Malicious Software
Child soliciting and Abuse

5 Types Hacking: Type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed The criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location

6 Types Theft: occurs when a person violates copyrights and downloads music, movies, games and software there are laws that prevent people from illegal downloading Cyber Stalking:  kind of online harassment wherein the victim is subjected to a barrage of online messages and s

7 Types Identity Theft: major problem with people using the Internet for cash transactions and banking services a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name Malicious Software: Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.

8 Cyber Crimes Classification: Against a person Against Properties
Crime targetting the government

9 Categories Individual:  This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming” Property: can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organization’s website or disrupt the systems of the organization.

10 Categories Government: crimes against a government are referred to as cyber terrorism criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations

11 Cyber crimes in mobile environment:
Smishing : In a smishing scam, people receive a text message on their phone telling them there's a problem with their bank account. The message will contain a phone number to call or a website to log into Vishing: Vishing is similar to smishing except instead of an SMS, a person will receive a voic giving them the same information. Spamming : Spam can appear in text messages as well as electronic mail. Besides the inconvenience of deleting spam, users may face charges for unwanted text messages.

12 Cyber crimes in mobile environment:
Data interception: Data interception can occur when an attacker is eavesdropping on communications originating from or being sent to a mobile device. Electronic eavesdropping is possible through various techniques, such as 1. when a mobile device connects to an unsecured WiFi network and an attacker intercepts 2. WiFi sniffing, which occurs when data are sent to or from a device over an unsecured (i.e., not encrypted) network connection Browser exploits: Visiting certain web pages and/or clicking on certain hyperlinks can trigger browser exploits that install malware or perform other adverse actions on a mobile device.

13 Cyber crimes in mobile environment:
Keystroke logging: This is a type of malware that records keystrokes on mobile devices in order to capture sensitive information, such as credit card numbers. Generally keystroke loggers transmit the information they capture to a cyber criminal's website or address Copy names of popular apps Cybercriminals have also created and distributed malware using the names of popular apps that are not yet available on the Android Market. Android users anticipating these games are the likely victims of this ruse Example : A recent example is a fake version of Temple Run we found in the Android Market

14 Unauthorized location tracking:
Spoofing: Attackers may create fraudulent websites to mimic or "spoof" legitimate sites and in some cases may use the fraudulent sites to distribute malware to mobile devices. spoofing occurs when the sender address and other parts of an header are altered to appear as though the originated from a different source. Unauthorized location tracking: Location tracking allows the whereabouts of registered mobile devices to be known and monitored. While it can be done openly for legitimate purposes, it may also take place surreptitiously. Location data may be obtained through legitimate software applications as well as malware loaded on the user's mobile device.

15 Cyber crimes in mobile environment:
Stealing personal data like files, contacts, photos and other private details. Charging a ‘fee’ for use, update or installation of a legitimate and usually free app. Pretending to be a mobile AV solution but actually having no useful functionality.

16 Attacks against mobile devices generally occur through four different channels of activities:
Software downloads Visiting a malicious website Direct attack through the communication network. Physical attacks

17 Anatomy of a Hacked Mobile Device: How a hacker can profit from your smartphone

18 Preventions Cyber security Privacy policy Keep software up to date
Use good passwords Disable remote connectivity


Download ppt "Cyber Crimes."

Similar presentations


Ads by Google