Cyber Crimes Mumbai Police. Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
By Andy Scott, Michael Murray and Adam Kanopa
Introduction and Overview of Digital Crime and Digital Terrorism
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
What is identity theft, and how can you protect yourself from it?
Cyber X-Force-SMS alert system for threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
| | Presents.
Information Systems Design and Development Security Risks Computing Science.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber Crime Awareness EFREN LAGAC FERNANDEZ II, GCTCP Police Chief Inspector Chief, Administrative Branch Chief, MIS/Forensic Sec, Investigation Branch.
Cyber crime and security issues
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Technical Implementation: Security Risks
CYBER CRIME fb MANIA & TEACHERS
Scams & Schemes Common Sense Media.
GCSE ICT SECURITY THREATS.
Digital Citizenship Middle School
A Project on CYBER SECURITY
Phishing is a form of social engineering that attempts to steal sensitive information.
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
HOW DO I KEEP MY COMPUTER SAFE?
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME fb MANIA & TEACHERS
Computer Security.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Cyber Crimes Mumbai Police

Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted be computers You are able to monitor all transactions online

Definition of a computer crime All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system Computer crime is when – Computer is a target – Copputer is a tool for the crime – Computer is incidental to a crime

The Usual Suspects Disgruntled employess Teenagers Political hacktivist Professional Hackers Business Rival Ex wife or husband/BF or GF

Usual Victims Gullible Greedy people Unskilled and Inexperienced Trusting People Unlucky people

Computer crimes are Vulnerable because Anonymity Computer’s storage capacity Weakness in operating system Lack of Awareness from user

Different types of Cyber Crimes Hacking Denial of service attack Virus dissemination Software Piracy Pornogrphy IRC Crimes Credit Card Fraud NET Extortion Phishing Spoofing Cyber Stalking Cyber Defamation Threatening Salami Attack

Hacking Hacking: Illegal intrusion into a computer system without the permission of the computer owner/user

Denial of Service Attack An act by the criminal, who floods the bandwidth of the victim’s network or fills their box with spam mail depriving him of the services he is entitled to acces or provide

Virus Dissemination Malicious software that attaches itself to other software. (Virus, Worms, Trojan Horse, Time Bomb, Logic Bomb)

Software Piracy Theft of Software through the illegal copying of genuine programs or the counterfeiting and distribution of products inteded to pass for the original – Examples(Pirate Bay, Bootlegs, etc) – End user copying, Downloads

Pedophiles Internet allows them to – Instant access to other predators worldwide; – Open discussion with children – Support from other pedophiles – Disguise their identities

Pedophiles Pedophile organizations include – NAMBLA (The North American Man-Boy Love Association) and – PAN (Pedophile Alert Network) in the Netherlands. – Members receive monthly magazines and newsletters that include seduction techniques and advice on avoiding detection and prosecution. Pedophiles meet each other via the Internet where they swap methods, success stories, even names, descriptions, and images of children.

IRC Crime Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques Pedophiles use chat rooms to allure small children Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males

Credit Card Fraud If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner

Credit Card Skimmers

How they do it

Credit card writer

NET Extortion Copying the company’s confidential data in order to extort the company for a huge amount

Phishing A technique of pulling out confidential information from the bank/financial accounts by deceptive means

EX: of Phishing From: *****Bank Sent: 08 June :25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. ****** Bank Limited

Spoofing Getting one Computer on the network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.

Cyber Stalking The criminal follows the victim by sending s, entering the chat rooms as the person being stalked frequently

Cyber Defamation The Criminal sends s containing defamatory matters to all concerned off the victim or post the defamatory matters on a website.. (disgruntled employee may do this against boss,, ex-boys friend against girl,, divorced husband against wife etc)

Threatening The criminal sends threatening or comes in contact in the chat rooms with victim (Anyone disgruntled may do this against boss, friend or official)

Salami Attack In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like Rs per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

Sale of Narcotics Sale and Purchase through the net Websites offer sales and shipment of contraband drugs May use hidden messages to sell the drugs

Nigeria Scam This scam starts with a bulk mailing or bulk faxing of a bunch of identical letters to businessmen, professionals, and other persons who tend to be of greater-than- average wealth. This scam is often referred to as the scam, ironically after section of the Nigerian Penal Code which relates to fraudulent schemes