View
214
Download
0
Category
Preview:
Citation preview
7/27/2019 Cyber Fraud Why worry
1/5
Cyber Fraud Why worry?
Because, Cyber Crime usually has an impact on three things close to us Identity, Privacy and Finances. A
unique feature of cybercrime is that the consequences arent visible instantaneously as with other forms of
crimes like murder, burglary, kidnapping, etc. Also, the time interval between the occurrence of the crime and
the victims realization can sometimes be so long as to eliminate all possibilities of collecting appropriate
evidence.
Identity loss can be extremely damaging to ones finances and reputation. Fraudsters wait for those moments
when there is a compromise in basic security precautions while negotiating electronic identity and steal the
identity. The victims could be individuals as well as institutions that handle internet money transactions.
Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html
1 of 1 10/10/2013 10:09 AM
http://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.html7/27/2019 Cyber Fraud Why worry
2/5
Types of Cyber Fraud
Internet Fraud
A very common form of Internet fraud i s the distribution of rogue security software. Internet services can be
used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit
the proceeds of fraud to financial institutions or to others connected with the scheme.
Phishing Identity Theft
Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by
assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that
person's name. Identity theft occurs when someone uses your personally identifying information, like your
name, user id or credit card number, without your permission, to commit fraud or other crimes.
Phishing
Phishing refers to the process of imitating legitimate companies in emails or creating fake Web sites designed
to look like a legitimate Web site in order to entice users to share their passwords, credit card numbers, andother personal information. The perpetrator then uses the information to steal the target's identity or to sell that
identity to others. Users need to be educated not to give away personal information in response to an
unsolicited email.
Man-in-the-Middle Attack
The phrase "Man-in-the-Middle Attack" is used to describe a computer attack during which the cybercriminal
funnels communication between a consumer and a legitimate organization through a fake Web site. In these
attacks, neither the consumer nor the organization is aware that the communication is being illegally monitored.
The criminal is, in effect, in the middle of a transaction between the consumer and his or her bank, credit-card
Company, or retailer.
The man-in-the-middle server electronically eavesdrops on every keystroke, giving the criminal username,
password, and account information. They employ Spyware and other Malware that when loaded on the
consumers computer redirects the Web browser to the fake site. The most technically competent manipulate
the real Web site so that visitors are directed to the fake site.
Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html
1 of 1 10/10/2013 10:09 AM
http://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.html7/27/2019 Cyber Fraud Why worry
3/5
Protection against Cyber Frauds
Digital Signature Certificates (DSC) is considered to be one of the strongest tools to Cyber Security.
DSC uses a very complex algorithm to generate a pair of asymmetric keys Public and Private Key, wherein
the private key is held securely by the user and public key is available publicly. When a user appends DSC to
an electronic document or electronic transaction, the private key hashes the content of the document or
transaction and uses the private information of the user in the private key to sign the document or transaction
and this document or transaction is encrypted at the signors end. This signed document or transaction is
verified with the corresponding public key and decrypted by the authorized person.
DSCs is issued to an individual through an identity verification process as stipulated by Information
Technology Act in India and hence acts as an authenticating tool. For example in the case of
electronic banking and statutory efilings.
DSCs are given a legal sanctity in India under the Information Technology Act and hence it serves as
an evidence under the law and the signorcannot repudiate his / her act at a later stage.
The digitally signed document or transaction is encrypted at the signors end and gives the
protection against hacking or man-in-the-middle attacks. The signature will become invalid if there is
any change to the content and thereby ensures integrity and confidentiality of the content.
DSCs are issued by licensed Certifying Authorities under the Ministry of Information Technology, Government
of India as per the Information Technology Act.
Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html
1 of 1 10/10/2013 10:11 AM
http://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.html7/27/2019 Cyber Fraud Why worry
4/5
Recourse
If you feel that you are the victim of a cybercrime, as per the amendments to the Information Technology Act
2000, the minimum rank of investigation of cybercrimes is POLICE INSPECTOR and any jurisdictional police
station can register and investigate.
You could also contact your nearest Cyber Crime Police Station.
Bangalore: Cyber Crime Police Station,
CID Annexe Building, Carlton House,
# 1, Palace Road, Bangalore - 560001.
Telephone: 080 - 22942475, 080- 22943050
E-Mail:cybercrimeps@ksp.gov.in
Chennai: Assistant Commissioner of Police
Cyber Crime Cell
Commissioner office CampusEgmore, Chennai- 600008
Telephone: +91-40-5549 8211
E-mail id:s.balu@nic.in
Delhi:CBI Cyber Crime Cell:
Superintendent of Police,
Cyber Crime Investigation Cell
Central Bureau of Investigation,
5th Floor, Block No.3,
CGO Complex, Lodhi Road, New Delhi 3
Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html
1 of 2 10/10/2013 10:11 AM
mailto:cybercrimeps@ksp.gov.inmailto:s.balu@nic.inhttp://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.htmlmailto:s.balu@nic.inmailto:cybercrimeps@ksp.gov.in7/27/2019 Cyber Fraud Why worry
5/5
Superintendent of Police,
Cyber Crime Investigation Cell
Central Bureau of Investigation,
5th Floor, Block No.3,
CGO Complex, Lodhi Road, New Delhi 3
Telephone: 011-4362203, 011-4392424
E-Mail:cbiccic@bol.net.in
Hyderabad:Cyber Crime Police Station
Crime Investigation Department,
3rd Floor, D.G.P. Pffice
Lakdikapool, Hyderabad 500004
Telephone: 040-2324 0663, 040-2785 2274
E-mail id:cidap@cidap.gov.in, info@cidap.gov.in
Kolkata: Public Grievance Cell 2250-5134 / 5340
E-Mail: grievance@kolkatapolice.gov.in
Cyber Police Station
Telephone: 2214-3000 / 3004 / 1420
E-Mail:cyberps@kolkatapolice.gov.in
Mumbai: Cyber Crime Investigation cell,
Annex III, 1st floor, Office of the Commissioner of Police,
D.N.Road, Mumbai - 400001
Telephone: 022 - 24691233
Email:cybercell.mumbai@mahapolice.gov.in
Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html
2 of 2 10/10/2013 10:11 AM
mailto:cbiccic@bol.net.inmailto:cidap@cidap.gov.inmailto:info@cidap.gov.inmailto:grievance@kolkatapolice.gov.inmailto:cyberps@kolkatapolice.gov.inmailto:cybercell.mumbai@mahapolice.gov.inhttp://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.htmlmailto:cybercell.mumbai@mahapolice.gov.inmailto:cyberps@kolkatapolice.gov.inmailto:grievance@kolkatapolice.gov.inmailto:info@cidap.gov.inmailto:cidap@cidap.gov.inmailto:cbiccic@bol.net.inRecommended