Cyber Fraud – Why worry

  • Upload
    acharya

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

  • 7/27/2019 Cyber Fraud Why worry

    1/5

    Cyber Fraud Why worry?

    Because, Cyber Crime usually has an impact on three things close to us Identity, Privacy and Finances. A

    unique feature of cybercrime is that the consequences arent visible instantaneously as with other forms of

    crimes like murder, burglary, kidnapping, etc. Also, the time interval between the occurrence of the crime and

    the victims realization can sometimes be so long as to eliminate all possibilities of collecting appropriate

    evidence.

    Identity loss can be extremely damaging to ones finances and reputation. Fraudsters wait for those moments

    when there is a compromise in basic security precautions while negotiating electronic identity and steal the

    identity. The victims could be individuals as well as institutions that handle internet money transactions.

    Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html

    1 of 1 10/10/2013 10:09 AM

    http://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.html
  • 7/27/2019 Cyber Fraud Why worry

    2/5

    Types of Cyber Fraud

    Internet Fraud

    A very common form of Internet fraud i s the distribution of rogue security software. Internet services can be

    used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit

    the proceeds of fraud to financial institutions or to others connected with the scheme.

    Phishing Identity Theft

    Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by

    assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that

    person's name. Identity theft occurs when someone uses your personally identifying information, like your

    name, user id or credit card number, without your permission, to commit fraud or other crimes.

    Phishing

    Phishing refers to the process of imitating legitimate companies in emails or creating fake Web sites designed

    to look like a legitimate Web site in order to entice users to share their passwords, credit card numbers, andother personal information. The perpetrator then uses the information to steal the target's identity or to sell that

    identity to others. Users need to be educated not to give away personal information in response to an

    unsolicited email.

    Man-in-the-Middle Attack

    The phrase "Man-in-the-Middle Attack" is used to describe a computer attack during which the cybercriminal

    funnels communication between a consumer and a legitimate organization through a fake Web site. In these

    attacks, neither the consumer nor the organization is aware that the communication is being illegally monitored.

    The criminal is, in effect, in the middle of a transaction between the consumer and his or her bank, credit-card

    Company, or retailer.

    The man-in-the-middle server electronically eavesdrops on every keystroke, giving the criminal username,

    password, and account information. They employ Spyware and other Malware that when loaded on the

    consumers computer redirects the Web browser to the fake site. The most technically competent manipulate

    the real Web site so that visitors are directed to the fake site.

    Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html

    1 of 1 10/10/2013 10:09 AM

    http://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.html
  • 7/27/2019 Cyber Fraud Why worry

    3/5

    Protection against Cyber Frauds

    Digital Signature Certificates (DSC) is considered to be one of the strongest tools to Cyber Security.

    DSC uses a very complex algorithm to generate a pair of asymmetric keys Public and Private Key, wherein

    the private key is held securely by the user and public key is available publicly. When a user appends DSC to

    an electronic document or electronic transaction, the private key hashes the content of the document or

    transaction and uses the private information of the user in the private key to sign the document or transaction

    and this document or transaction is encrypted at the signors end. This signed document or transaction is

    verified with the corresponding public key and decrypted by the authorized person.

    DSCs is issued to an individual through an identity verification process as stipulated by Information

    Technology Act in India and hence acts as an authenticating tool. For example in the case of

    electronic banking and statutory efilings.

    DSCs are given a legal sanctity in India under the Information Technology Act and hence it serves as

    an evidence under the law and the signorcannot repudiate his / her act at a later stage.

    The digitally signed document or transaction is encrypted at the signors end and gives the

    protection against hacking or man-in-the-middle attacks. The signature will become invalid if there is

    any change to the content and thereby ensures integrity and confidentiality of the content.

    DSCs are issued by licensed Certifying Authorities under the Ministry of Information Technology, Government

    of India as per the Information Technology Act.

    Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html

    1 of 1 10/10/2013 10:11 AM

    http://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.html
  • 7/27/2019 Cyber Fraud Why worry

    4/5

    Recourse

    If you feel that you are the victim of a cybercrime, as per the amendments to the Information Technology Act

    2000, the minimum rank of investigation of cybercrimes is POLICE INSPECTOR and any jurisdictional police

    station can register and investigate.

    You could also contact your nearest Cyber Crime Police Station.

    Bangalore: Cyber Crime Police Station,

    CID Annexe Building, Carlton House,

    # 1, Palace Road, Bangalore - 560001.

    Telephone: 080 - 22942475, 080- 22943050

    E-Mail:[email protected]

    Chennai: Assistant Commissioner of Police

    Cyber Crime Cell

    Commissioner office CampusEgmore, Chennai- 600008

    Telephone: +91-40-5549 8211

    E-mail id:[email protected]

    Delhi:CBI Cyber Crime Cell:

    Superintendent of Police,

    Cyber Crime Investigation Cell

    Central Bureau of Investigation,

    5th Floor, Block No.3,

    CGO Complex, Lodhi Road, New Delhi 3

    Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html

    1 of 2 10/10/2013 10:11 AM

    mailto:[email protected]:[email protected]://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.htmlmailto:[email protected]:[email protected]
  • 7/27/2019 Cyber Fraud Why worry

    5/5

    Superintendent of Police,

    Cyber Crime Investigation Cell

    Central Bureau of Investigation,

    5th Floor, Block No.3,

    CGO Complex, Lodhi Road, New Delhi 3

    Telephone: 011-4362203, 011-4392424

    E-Mail:[email protected]

    Hyderabad:Cyber Crime Police Station

    Crime Investigation Department,

    3rd Floor, D.G.P. Pffice

    Lakdikapool, Hyderabad 500004

    Telephone: 040-2324 0663, 040-2785 2274

    E-mail id:[email protected], [email protected]

    Kolkata: Public Grievance Cell 2250-5134 / 5340

    E-Mail: [email protected]

    Cyber Police Station

    Telephone: 2214-3000 / 3004 / 1420

    E-Mail:[email protected]

    Mumbai: Cyber Crime Investigation cell,

    Annex III, 1st floor, Office of the Commissioner of Police,

    D.N.Road, Mumbai - 400001

    Telephone: 022 - 24691233

    Email:[email protected]

    Cyber Security | Cyber Security tips, Cyber Security in Digital Sign... http://www.e-mudhra.com/cyber-security.html

    2 of 2 10/10/2013 10:11 AM

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]://www.e-mudhra.com/cyber-security.htmlhttp://www.e-mudhra.com/cyber-security.htmlmailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]