18
Cyber Crimes

Cyber Crimes. Introduction Definition Types Classification

Embed Size (px)

Citation preview

Page 1: Cyber Crimes. Introduction Definition Types Classification

Cyber Crimes

Page 2: Cyber Crimes. Introduction Definition Types Classification

Cyber Crimes

• Introduction• Definition• Types• Classification

Page 3: Cyber Crimes. Introduction Definition Types Classification

Introduction: • Crime committed using a computer and the

internet to steal a person's identity or illegal imports or malicious programs

• Cybercrime is nothing but where the computer used as an object or subject of crime

Definition:• Cybercrime is a term for any illegal activity that

uses a computer as its primary means of commission

Cyber Crimes

Page 4: Cyber Crimes. Introduction Definition Types Classification

TypesHackingTheftCyber StalkingIdentity TheftMalicious SoftwareChild soliciting and Abuse

Page 5: Cyber Crimes. Introduction Definition Types Classification

TypesHacking:

i. Type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed

ii. The criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location

Page 6: Cyber Crimes. Introduction Definition Types Classification

TypesTheft:

i. occurs when a person violates copyrights and downloads music, movies, games and software

ii. there are laws that prevent people from illegal downloading

Cyber Stalking: i. kind of online harassment wherein the

victim is subjected to a barrage of online messages and emails

Page 7: Cyber Crimes. Introduction Definition Types Classification

TypesIdentity Theft:i. major problem with people using the Internet for

cash transactions and banking servicesii. a criminal accesses data about a person’s bank

account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name

Malicious Software:i. Internet-based software or programs that are used

to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.

Page 8: Cyber Crimes. Introduction Definition Types Classification

Cyber CrimesClassification:

Against a personAgainst PropertiesCrime targetting the government

Page 9: Cyber Crimes. Introduction Definition Types Classification

CategoriesIndividual:

i.  This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”

Property:i. can steal a person’s bank details and siphon off

money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organization’s website or disrupt the systems of the organization.

Page 10: Cyber Crimes. Introduction Definition Types Classification

CategoriesGovernment:

i. crimes against a government are referred to as cyber terrorism

ii. criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations

Page 11: Cyber Crimes. Introduction Definition Types Classification

Cyber crimes in mobile environment:

Smishing : In a smishing scam, people receive a text

message on their phone telling them there's a problem with their bank account. The message will contain a phone number to call or a website to log into

Vishing: Vishing is similar to smishing except instead of an

SMS, a person will receive a voicemail giving them the same information.

Spamming : Spam can appear in text messages as well as

electronic mail. Besides the inconvenience of deleting spam, users may face charges for unwanted text messages.

Page 12: Cyber Crimes. Introduction Definition Types Classification

Cyber crimes in mobile environment:

Data interception: Data interception can occur when an attacker is eavesdropping

on communications originating from or being sent to a mobile device. Electronic eavesdropping is possible through various techniques, such as

1. when a mobile device connects to an unsecured WiFi network and an attacker

intercepts

2. WiFi sniffing, which occurs when data are sent to or from a device over an

unsecured (i.e., not encrypted) network connection

Browser exploits: Visiting certain web pages and/or clicking on certain hyperlinks

can trigger browser exploits that install malware or perform other adverse actions on a mobile device.

Page 13: Cyber Crimes. Introduction Definition Types Classification

Cyber crimes in mobile environment:

Keystroke logging:

This is a type of malware that records keystrokes on mobile devices in order to capture sensitive information, such as credit card numbers. Generally keystroke loggers transmit the information they capture to a cyber criminal's website or e-mail address

Copy names of popular apps Cybercriminals have also created and distributed

malware using the names of popular apps that are not yet available on the Android Market. Android users anticipating these games are the likely victims of this ruse

Example : A recent example is a fake version of Temple Run we found in the Android Market

Page 14: Cyber Crimes. Introduction Definition Types Classification

Spoofing: Attackers may create fraudulent websites to

mimic or "spoof" legitimate sites and in some cases may use the fraudulent sites to distribute malware to mobile devices. E-mail spoofing occurs when the sender address and other parts of an e-mail header are altered to appear as though the e-mail originated from a different source.

Unauthorized location tracking: Location tracking allows the whereabouts of

registered mobile devices to be known and monitored. While it can be done openly for legitimate purposes, it may also take place surreptitiously. Location data may be obtained through legitimate software applications as well as malware loaded on the user's mobile device.

Page 15: Cyber Crimes. Introduction Definition Types Classification

Cyber crimes in mobile environment:

Stealing personal data like files, contacts, photos and other private details.

Charging a ‘fee’ for use, update or installation of a legitimate and usually free app.

Pretending to be a mobile AV solution but actually having no useful functionality.

Page 16: Cyber Crimes. Introduction Definition Types Classification

Attacks against mobile devices generally occur through four different channels of activities:

Software downloadsVisiting a malicious websiteDirect attack through the communication

network.Physical attacks

Page 17: Cyber Crimes. Introduction Definition Types Classification

Anatomy of a Hacked Mobile Device: How a hacker can profit from your smartphone

Page 18: Cyber Crimes. Introduction Definition Types Classification

PreventionsCyber securityPrivacy policy Keep software up to dateUse good passwordsDisable remote connectivity