37
Combating Cyber Crime Presentation by : Pr iyanka Tomar [email protected]

Combating Cyber Crime

Embed Size (px)

Citation preview

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 1/37

Combating Cyber Crime

Presentation by : Priyanka Tomar

[email protected]

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 2/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 3/37

PREREQUISITES Computer Hardware

Computer Software

Internet Surfing Email

Networking

IP Address

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 4/37

Combating Cyber Crime Cyber + Security

 What is Security

 What is Cyber Security

involves detection, prevention and responding to attacks

 Why do we need Cyber Security –Phishing, Credit Card Frauds

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 5/37

Combating Cyber Crime Who is Vulnerable –e.g. screen hack

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 6/37

Cyber Security Threats Virus

 Worm

Trojan Horse Remote Administration Tool – Prorat, Poison Ivy

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 7/37

Cyber Security Threats-RATThe operator controls the RAT through a network connection. RAT

provide an operator the following capabilities:

Screen/camera control.

File management (download/upload/execute etc. Shell control (from command prompt).

Computer control (power off/on/log off).

Registry management (query/add/delete/modify).

Start, stop and restart Windows services.

Copy/delete files and format disks.

 View and clear the windows event logs.

Other software product-specific functions.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 8/37

Cyber Security Threats Hackers

Identity Thieves

Spyware/Adware  Website advertisements

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 9/37

Consequences of Inaction Loss of access

Loss of confidentiality, integrity and public trust

Lawsuits, Disciplinary action

The US has charged six members of an internationalcybercrime gang that hacked into user accounts to defraudeBay's Stubhub ticket reselling website of about $1m.

The men were arrested in the UK, Canada and Spain inconnection with the scam in which more than 1,600StubHub users had their credit cards used to buy tickets,

 which were then sold on by the criminals.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 10/37

Preventive Measures -I OS/Software Updates

 Anti virus

Personal Firewalls Check Open Ports -http://www.auditmypc.com/firewall-test.asp

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 11/37

How to block Ports Block Ports

Control Panel>System and Security> Windows Firewall

 Advanced Settings See inbound and outbound rules

Create your own rule

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 12/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 13/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 14/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 15/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 16/37

How to know if there is spyware?

Endless pop-up windows.

Redirected to other websites automatically.

Random Windows error messages . Computer suddenly seems slow.

New and unexpected toolbars appear in web browser.

New and unexpected icons appear in the task tray.

Browser's home page suddenly changed.

Search engine your browser opens has been changed.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 17/37

Don't click on links within pop-up windows

Be careful while installing free software , never forgetto read user agreement.

Block pop-up windows and cookies by adjustingbrowser preferences.

Be aware of unexpected dialog boxes asking -Do you

 want to run a xxxx program . Always select "no" or"cancel," or close the dialog box.

Prevent Spyware Installation

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 18/37

Remove Spyware Spyware copies several files to different directories and

changes the registry. Use a spyware remover - aprogram dedicated to removal of sypware. 

Run a legitimate product to remove spyware e.g Ad-Aware, Microsoft Window Defender, Webroot'sSpySweeper etc.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 19/37

Preventive Measures-II Prevent Identity Theft-Beware of phishing scams - a form of fraud that uses

email messages that appear to be from a reputable business (often a financial institution)in an attempt to gain personal/ financial account information. These often do notinclude a personal salutation. Never enter personal information into an online form you

accessed via a link in an email you were not expecting. Legitimate businesses will not askfor personal information online.

Intrusion Detection Software/Device

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 20/37

PhishingGoogle Security Team to Sunitha

 Verification Required.

Dear Gmail User, 

The Gmail infrastructure is going through an annual security and performance overhaul. In the same respect, youare requested to verify your account by clicking on the following link. The Google Security Team is available toprovide you all the assistance for secure communication over the Internet. Happy surfing!

accountverification.gmail.com/src/verify.php?confirmation=dhPGcsiuUNdnAoN77q5CHwCgl4MmCAXE72d 

 You are requested to act on this immediately to guarantee the smooth functioning of your mail account. 

Thanks, Account Security AdministratorGoogle Security Team

Google, Inc. Phone: +1 650-253-0000

 You are receiving this message from Google because you are a valued member. Google respects your privacy. Tolearn more, please read our online Privacy Statement. For more information or for general questions regarding

 your e-mail account, please visit Gmail Help.

Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043. All rights reserved.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 21/37

Phishing WebsiteSee URL inaddress bar

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 22/37

Preventive Measures Protect Passwords

Regular Backup

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 23/37

Preventive Measures -II Setup Cyber Security Policies

Email Virus Filtering Services

Firewall Services Email attachment Filtering

 Vulnerability Scanning

Intrusion Prevention System

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 24/37

Be aware while using gmail Alternate email

Last account activity

Settings> Chat Settings>Accounts and Import > Account Settings

> Other Accounts Settings>Security

>Other Accounts Settings>

Settings> Accounts and Import > Grant access to your account –can add other gmail

Mark conversation as read when opened by others

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 25/37

Be aware while using gmail cont:: Set Alerts-

https://www.google.com/settings/security?hl=en

Filter/Block emails

 Add Forwarding Address: You can have your emailsautomatically forwarded to another address.

Be Alert!!!!!!!

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 26/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 27/37

Intrusion Detection Used to monitor for “suspicious activity” on a network 

Can protect against known software exploits, like bufferoverflows

Open Source IDS: Snort

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 28/37

Hackers Black

Grey

 White

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 29/37

Google Hacking Google hacking is a computer hacking technique that

uses Google Search and other Google applications tofind security holes in the configuration and computer

code that websites use.

The following search query will locate all websites thathave the words "admbook" and "version" in the title ofthe website. It also checks to ensure that the web pagebeing accessed is a PHP file.

intitle:admbook intitle:version filetype:php 

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 30/37

Email Encryption Email encryption is authentication, of email

messages, to protect the content from being read byany but the intended recipients. Email encryption has

been used by journalists and regular users to protectprivacy.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 31/37

Email Encryption Cont Your public key is the part of the encryption that you

make public. Your private key is the part of theencryption that you never share with anyone under

any circumstance.The two keys work together so that you need both todecrypt anything.

Get GPG installed on our operating system. It is availableat http://www.gnupg.org/download/ 

Mozilla Thunderbird

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 32/37

Write Protect USB Drive Step 1: Open the Registry Editor by opening the “Run”

dialog box, type regedit and hit “Enter”). 

Step 2.Go to Registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlS

et\Control\

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 33/37

Cont: Step3: Right-click on Control, click on New->Key  and

name it as StorageDevicePolicies. Now a New Keynamed as StorageDevicePolicies is created.

Step 4. Right-click on StorageDevicePolicies andcreate a New->DWORD (32-bit) Value and name it as

 WriteProtect.

Step 5: By double clicking on WriteProtect, set value 1from 0.

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 34/37

Write Protect USB- Cont:No w the right-protection for USB drives is enabled on your

computer thus it would not be possible for anyone or anyprogram to add/delete the contents from USB flash drive.

 Any attempt to copy or download the files onto the USBdrive will result error message:

"Remove the Write Protection or Use another Disk" 

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 35/37

Cyber Crime "unlawful acts wherein the computer is either

a tool or a target or both".

crimes where a computer is the target of thecrime,

crimes where a computer is a tool of the

crime, and

crimes where a computer is incidental to the

commission of the crime. 

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 36/37

8/11/2019 Combating Cyber Crime

http://slidepdf.com/reader/full/combating-cyber-crime 37/37

Cyber Crime as a Services Crimeware-as-a-Service

Cybercrime Infrastructure-as-a-Service

Hacking-as-a-Service