logging in or signing up CYBER CRIMES Affecting the world aSGuest87580 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 572 Category: Science & Tech.. License: All Rights Reserved Like it (0) Dislike it (0) Added: February 24, 2011 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript Slide 1: CYBER CRIMES AFFECTING THE WORLD??.. Suchandra and Adarsh 1Cyber Crime:: Cyber Crime: Computer crime , or cybercrime , refers to any crime that involves a computer and a network . The computer may have been used in the commission of a crime, or it may be the target . Netcrime refers , more precisely, to criminal exploitation of the Internet . Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking , copyright infringement , child pornography , and child grooming . There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Suchandra and Adarsh 2Slide 3: cyber crimes can be divided into one of two types of categories : crimes that target computer networks or devices directly. crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. Suchandra and Adarsh 3Slide 4: Examples of crimes that primarily target computer networks or devices would include : Computer viruses Denial-of-service attacks Malware (malicious code ) Examples of crimes that merely use computer networks or devices would include : Cyberstalking Fraud and identity theft Information warfare Phishing scams Suchandra and Adarsh 4Threats: IIlicit Activities : Threats: IIlicit Activities Hackers: enjoy intellectual challenges of overcoming software limitations and how to increase capabilities of systems Crackers: illegally break into other people’s secure systems and networks Cyber Terrorists: threaten and attack other people’s computers to further a social or political agenda Suchandra and Adarsh 5Motivation for Hackers:: Motivation for Hackers: The challenge... ‘because it’s there!’ Ego Espionage Ideology Mischief Money (extortion or theft) Revenge Suchandra and Adarsh 6Threats: Illicit Activities : Threats : Illicit Activities Malware Writers : responsible for the creation of malicious software Samurai : hackers hired to legally enter secure computer/network environments ‘ Phreakers ’: Focus on defeating telephone systems and associated communication technologies Suchandra and Adarsh 7Threats: Illicit Activities : Threats: Illicit Activities ‘ Phishing ’: sending out ‘scam’ e-mails with the criminal intent of deceit and extortion Spam: unsolicited and/or undesired bulk e-mail messages, often ‘selling’ a product (See also SPIM – targeting of instant messaging services) Zombie Computers: Yours? Suchandra and Adarsh 8Zombie BotNets: Zombie BotNets Botnet is a jargon term for a collection of software robots, or ‘bots, which run autonomously. This can also refer to the network of computers using distributed computing software. While the term "botnet" can be used to refer to any group of bots, the word is generally used to refer to a collection of compromised machines (zombies) running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka "bot herder") can control the group remotely, and usually for nefarious purposes such as the sending of mass spam. Suchandra and Adarsh 9Phishing: Phishing Phishing is a technique used by strangers to "fish" for information about you, information that you would not normally disclose to a stranger, such as your bank account number, PIN, and other personal identifiers such as your National Insurance number. These messages often contain company/bank logos that look legitimate and use flowery or legalistic language about improving security by confirming your identity details. Suchandra and Adarsh 10Phishing Example: Phishing Example Suchandra and Adarsh 11Computer Viruses, Worms, Trojan Horses, Spyware & Other Malware: Computer Viruses, Worms, Trojan Horses, Spyware & Other Malware Computer virus: program which can copy itself and surreptitiously infect another computer, often via shared media such as a floppy disk, CD, thumb drive, shared directory, etc. Viruses are always embedded within another file or program. Worm: self-reproducing program which propagates via the network. Trojan horse: program which purports to do one thing, but secretly does something else; example: free screen saver which installs a backdoor Root kit: set of programs designed to allow an adversary to surreptitiously gain full control of a targeted system while avoiding detection and resisting removal, with the emphasis being on evading detection and removal Botnet: set of compromised computers ("bots" or "zombies") under the unified command and control of a " botmaster ;" commands are sent to bots via a command and control channel (bot commands are often transmitted via IRC, Internet Relay Chat). Spyware: assorted privacy-invading/browser-perverting programs Malware: an inclusive term for all of the above -- "malicious software " Suchandra and Adarsh 12Spam: Spam E-mail spam , also known as junk e-mail or unsolicited bulk e-mail ( UBE ), is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail . Definitions of spam usually include the aspects that e-mail is unsolicited and sent in bulk. One subset of UBE is UCE (unsolicited commercial e-mail). “ Spam accounts for 9 out of every 10 emails in the United States.” Suchandra and Adarsh 13There are several types of Malware.. Viruses :: : There are several types of Malware.. Viruses :: Conceal themselves Infect computer systems Replicate themselves Deliver a ‘payload’ Suchandra and Adarsh 14Threats: MALWARE: Threats: MALWARE Malware is Malicious Software - deliberately created and specifically designed to damage, disrupt or destroy network services, computer data and software Suchandra and Adarsh 15There are several types of Malware Viruses which affect as follows.. : There are several types of Malware Viruses w hich affect as follows.. Conceal themselves Infect computer systems Replicate themselves Deliver a ‘payload Suchandra and Adarsh 16Malware Types: Malware Types Worms: Programs that are capable of independently propagating throughout a computer network. They replicate fast and consume large amounts of the host computers memory Suchandra and Adarsh 17Malware Types: Malware Types Trojan Horses: Programs that contain hidden functionality that can harm the host computer and the data it contains. THs are not automatic replicators - computer users inadvertently set them off. Suchandra and Adarsh 18Malware Types: Malware Types Software Bombs: Time Bombs - triggered by a specific time/date Logic Bombs - triggered by a specific event Both are introduced some time before and will damage the host system Suchandra and Adarsh 19What do you think motivates Malware writers to create and unleash these attacks?: What do you think motivates Malware writers to create and unleash these attacks? 20 Suchandra and AdarshMalware Writer Motivations: Malware Writer Motivations To see how far the virus can spread To cause damage and destruction to a targeted individual or organisation To achieve a feeling of superiority/power To leverage some form of personal gain To provide a ‘lesson’ in Internet security To conduct an experiment Suchandra and Adarsh 21Wi-Fi High Jacking : Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected? Most people say “Our data is boring” But… criminals look for wireless networks to commit their crimes And… the authorities will come knocking on your door….. Suchandra and Adarsh 22Protect your Computers!: Protect your Computers! Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist Back-up your computer data on disks or CDs often Don't share access to your computers with strangers If you have a wi-fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info too! Suchandra and Adarsh 23Additional points: Additional points To 5 countries affected by cyber crimes are 1.USA 2.CHINA 3.RUSSIA 4.BRAZIL 5.INDIA. The world loses 557 million’$’ anually to cyber crime. Computer crime rises 57% year by year. Suchandra and Adarsh 24A final word: : A final word: Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months Suchandra and Adarsh 25CYBER CRIMES Power Point Presentation by: Suchandra and Adarsh: CYBER CRIMES Power Point P resentation by: S uchandra and A darsh Suchandra and Adarsh 26 You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.