14
By Inqilab Ruknuddin Patel (MCS) KN Academy Malir Computer Crime

Computer crime by inqilab patel

Embed Size (px)

DESCRIPTION

"Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“

Citation preview

Page 1: Computer crime by inqilab patel

By Inqilab Ruknuddin Patel (MCS)KN Academy Malir

Computer Crime

Page 2: Computer crime by inqilab patel

"Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“

Cyber Crime

Page 3: Computer crime by inqilab patel

Internet Terminology

Page 4: Computer crime by inqilab patel

Cyber Crimes

Page 5: Computer crime by inqilab patel

Hacking

Make your passwords long and complicated, and with a good mix of letters and numbers, as well as utilizing case-sensitive letters. Don't use anything familiar, such as your birthday, your children's names or anything like that. If a hacker wants to attempt to break into your email accounts, at least make him work for it.Don't ever allow your browser to remember your passwords. True, it may be a bit of an inconvenience to enter your password every time you log in.Activate Firewall

Protection

Hacking is unauthorized use of computer and network resources.

The activity of breaking into a computer system to gain an unauthorized access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking.

Definition

Page 6: Computer crime by inqilab patel

Disguising as a trustworthy source

Phishing (fishing)

Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.

Page 7: Computer crime by inqilab patel
Page 8: Computer crime by inqilab patel

• The most powerful weapon against phishing is common sense and the following rules that every user should oblige to.

• If you are not a customer of the site delete the email immediatly. Don´t click on the link or reply.

• If you are a customer and you are not sure if the email is legit do one of the following:

• Contact the institute by phone or contact at the official website ( do not use the email link of course) and ask if the mail is official.

• Instead of using the link provided open the website by typing in the official link there. The site should have news about the email on their starting page. (most of the time). If not, use 2a to verify the email.

PhishingPhishing Protection

Page 9: Computer crime by inqilab patel

PharmingDNS Poisoning

Pharming in Simple Steps:Hacker creates a fake website which appears similar to the original website.Hacker poisons the DNS servers thus domain names are resolved into fake IP address.User types the URL of the original website in the browser.The DNS server directs User to the fake website designed by hacker.User not knowing that it is a fake website, shares his confidential information such as login, password... etc.Hacker gets the user confidential information from his fake web site and uses it to access the original website.Hacker exploits user's confidential information to his liking.

Page 10: Computer crime by inqilab patel

PharmingDNS

Poisoning

Pharming in Simple Steps:Hacker creates a fake website which appears similar to the original website.Hacker poisons the DNS servers thus domain names are resolved into fake IP address.User types the URL of the original website in the browser.The DNS server directs User to the fake website designed by hacker.User not knowing that it is a fake website, shares his confidential information such as login, password... etc.Hacker gets the user confidential information from his fake web site and uses it to access the original website.Hacker exploits user's confidential information to his liking.

Page 11: Computer crime by inqilab patel

Protection from Pharming

Pharming

Use a trusted, legitimate Internet Service Provider. Rigorous security at the ISP level is your first line of defense against pharming.

Check the certificate. It takes just a few seconds to tell if a site you land on is legitimate.Block suspicious Websites automatically

Check the URL of any site that asks you to provide personal information. Make sure your session begins at the known authentic address of the site, with no additional characters appended to it.

321

Page 12: Computer crime by inqilab patel

Internet Business Scams

Dear Friend, as you read this, I don't want you to feel sorry for me, because, I believe everyone will die someday. My name is Mr Adada Muhammadu, a Crude Oil merchant in Nigeria and I have been diagnosed with Esophageal cancer. It has defied all forms of medical treatment, and right now I have only about a few months to live, according to medical experts. I want God to be merciful to me and accept my soul so, I have decided to give alms to charity organizations, as I want this to be one of the last good deeds I do on earth. So far, I have distributed money to some charity organizations in Austria, Cameroon, Liberia, Algeria and Malaysia. Now that my health has deteriorated badly, I cannot do it myself anymore. The last of my money which no one knows of is the huge cash deposit of Eighty million dollars $80,000,000 that I have with a finance/Security Company abroad. I will want you to help me collect this deposit and dispatched it to charity organizations. I have set aside 20% for you and for your time. God be with you. ~ Mr Adada Muhammadu"

Page 13: Computer crime by inqilab patel

First and foremost, let me make it clear. There is some good news for all you get paid program enthusiasts. Not all get paid programs are fake but 99%. They Cheat by demanding a subscription fee or a membership fee

Once again, a majority of these programs are downright fake. Most of them promise home based business opportunities and jobs involving typing, data entry, etc. However, all of them vanish from existence once they've managed to lay their hands on the 'small' subscription fee that you pay them.

It's not what it sounds like. The banks haven't started getting into Internet crime (and thank God for that!). It's just that some cunning fraudsters create duplicate (read FAKE) websites which are complete with the bank's logo, hyperlink, etc. Then they send fake emails on behalf of the 'bank', asking you to visit the bank website (obviously the fake one) and enter your account details as well as other sensitive information.

Most Common Business Scams

Get Paid Programs

Bank Scams:

Work From Home Scams

Page 14: Computer crime by inqilab patel

THANK [email protected]