Upload
rajat-s
View
235
Download
0
Embed Size (px)
Citation preview
8/14/2019 cyber crime-internet weakest links.ppt
1/16
CYBER CRIMESINTERNETS WEAKEST LINK
8/14/2019 cyber crime-internet weakest links.ppt
2/16
8/14/2019 cyber crime-internet weakest links.ppt
3/16
EXAMPLES OF CYBER CRIME
Cyber Spamming
Computer frauds
Cyber Stalking
Identity Theft
Phishing
Denial of Service
Attack
Spoofing
Net Extortion
Cyber terrorism
Defamation
8/14/2019 cyber crime-internet weakest links.ppt
4/16
REASONS WHY CYBERCRIMES OCCUR?
Monetary
Hacker tries to steal $1.8 millionfrom Arlington's bank account)
Hackers steal $6.7M in South African bank
robbery all this over new year break1st April 2012
Jan 18th 2012
http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.htmlhttp://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.htmlhttp://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.htmlhttp://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.htmlhttp://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.slashgear.com/hackers-steal-6-7m-in-cyber-bank-robbery-18209697/http://www.star-telegram.com/2012/04/01/3850876/computer-hacker-tries-to-steal.html8/14/2019 cyber crime-internet weakest links.ppt
5/16
REASONS WHY CYBER CRIMES OCCUR?
Recognition
Hacktivism:
DOS/DDOS Attacks
April 2012, February 2012, June 2011
CIA website Downed byAnonymouson three occasions
http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/http://rt.com/news/cia-site-claims-attack-807/8/14/2019 cyber crime-internet weakest links.ppt
6/16
REASONS WHY CYBER CRIMES OCCUR?
Geopolitical rivalry manifesting in corporate cybercrime
3rd January 2012 Saudi Hackers Post Israeli Credit CardNumbers Online
Political
http://www.pcmag.com/article2/0,2817,2398297,00.asphttp://www.pcmag.com/article2/0,2817,2398297,00.asphttp://www.daytondailynews.com/news/dayton-news/dayton-fbi-partner-website-hacked-1333986.htmlhttp://www.pcmag.com/article2/0,2817,2398297,00.asp8/14/2019 cyber crime-internet weakest links.ppt
7/16
REASONS WHY CYBER CRIMES
OCCUR?Fun
15-year-old arrested for
hacking 259companies websites
January 2012 to March 2012
Google kills Iranian blog with 3million hacked bank accounts
http://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/11585http://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/11585http://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/11585http://www.zdnet.com/blog/security/google-kills-iranian-blog-with-3-million-hacked-bank-accounts/11779http://www.zdnet.com/blog/security/google-kills-iranian-blog-with-3-million-hacked-bank-accounts/11779http://www.zdnet.com/blog/security/google-kills-iranian-blog-with-3-million-hacked-bank-accounts/11779http://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/11585http://www.zdnet.com/blog/security/15-year-old-arrested-for-hacking-259-companies/115858/14/2019 cyber crime-internet weakest links.ppt
8/16
SIMPLE ATTACK
Step1 Step2
8/14/2019 cyber crime-internet weakest links.ppt
9/16
Step3 Step4
SIMPLE ATTACK
8/14/2019 cyber crime-internet weakest links.ppt
10/16
SIMPLE ATTACK
Step5 Step6
8/14/2019 cyber crime-internet weakest links.ppt
11/16
NUMBERS
8/14/2019 cyber crime-internet weakest links.ppt
12/16
ALL AMOUNTS IN USD
21
USA
BN
2MEXICO
BN
8BRAZIL
BN
16
EUROPE
BN
2RUSSIA
BN
46
CHINA
BN
8INDIA
BN 0.5JAPAN
BN
2AUSTRALIA
BN
THE GLOBAL PRICETAG OF CONSUMER CYBERCRIME
NUMBERS
8/14/2019 cyber crime-internet weakest links.ppt
13/16
TYPES OF ATTACKS IN 2011When Who By & How Outcome
March 17, 2011 Hacked by an Advanced Persistent
Threat (APT)
Used SecurId codes they
stole from the RSA break-in to hack Lockheed
Martin
June 2, 2011 Through Spear phishing used byChinese Hackers
Gmail accounts of select
members of the U.S.
Government had been
compromised
May, 2011 200,000 Customer A/c werecompromised by a cyber-attack.
Hackers accessed account holders'
names, email addresses, and
account numbers
Citi ordered new credit
cards for 100,000
customers absorbing the
$2 million cost
June 11, 2011 Hackers used a "spear phishing"technique
Degree of the compromise
was not specifiedICA's Attack
8/14/2019 cyber crime-internet weakest links.ppt
14/16
TYPESOF ATTACKS IN 2012When Who By & How Outcome
August, 2012 Hacktivist Group Anonymous Site was unavailableDemanding freedom for
Wikileaks founder Julian
Assange
July 12, 2012 Group of Hackers used Unionbased SQL injection
SQL injection retrieved
453,000 user names and
passwords stored inplaintext
September 25,
2012
Muslim hackers launched a
distributed a denial-of-service
attack against it
Bank was forced to shut
down the website
Interpol British Police SOCA
8/14/2019 cyber crime-internet weakest links.ppt
15/16
8/14/2019 cyber crime-internet weakest links.ppt
16/16
THANKYOU