22
GHOST ARE THEY REAL CYBER CRIMES

Cyber crime

Embed Size (px)

DESCRIPTION

Down load this file and and give your opinions

Citation preview

Page 1: Cyber crime

GHOST ARE THEY REAL CYBER CRIMES

Page 2: Cyber crime

GHOST ARE THEY REAL CYBER CRIMES

Page 3: Cyber crime

GROUP MEMBERS

• M. ARSLAN MAQBOOL(10-ARID-210)

• DANYAL SHOUKAT(11-ARID-688)

• TABRAIZ IQBAL(11-ARID-774)

• FURQAN RASHID (11-ARID-724)

• UMAIR KHAN(11-ARID-758)

Page 4: Cyber crime

Agenda

Introduction of Cyber crimeTypes of cyber crimeComputer VirusesTypes of virusesCyber ThreatsCyber Threat EvolutionNew Internet ThreatsSecurity PoliciesGovernment Policies

Page 5: Cyber crime

Introduction to Cyber Crime

Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime.

Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet

Page 6: Cyber crime

Different Types of Cybercrimes

Cyber crimes

Hacking Information

TheftE-mail

bombingSalami attacks

Denial of Service attacks

Trojan attacks

Web jacking

Page 7: Cyber crime

E-Mail Bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in interruption in the victims’ e-mail account or mail servers.

Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

Salami Attacks: These attacks are used for the commission of financial crimes. A bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer

Denial of Service: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.

TYPES OF CYBER CRIMES

Page 8: Cyber crime

Types of Cyber crimes(Contd.) Credit card frauds Sale of illegal articles-narcotics, weapons,

wildlife

Online gambling

Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code

Email bombing

Cyber terrorism Crime against persons

Crime against Government

Crime against property

Page 9: Cyber crime

Cyber Crime Data In Regional Context

CARDING:-

Carding is a serious threat to India, as it does not require a high degree of sophistication and is considered particularly pernicious by international financial institutions and e-commerce providers.

BOTS:-

Bots, compromised servers that may be launching cyber attacks or sending Spam.

Page 10: Cyber crime

Computer Viruses

What does Computer Virus mean ?

A computer virus is an executable program depend on the nature of a virus. It may cause damage of your hard disk contents or interfere normal operation at your computer.

A computer virus is a program that can copy itself and infect a computer without permission or knowledge of the user.

Page 11: Cyber crime

Why Do people Create These Viruses?

To distribute political message.

To attack the products of specific companies.

Some consider their creations to be works of art, and see as a creative hobby.

Financial gain from identity theft

Page 12: Cyber crime

Types of Viruses

Types of viruses

file virus Boot sector virus

Macro virus

Page 13: Cyber crime

Cyber Threats

Cyber Threats

Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and network using a data communications pathway.

Main threats to cyber crime is Hacking. Hacking involves gaining unauthorized access to a computer.

Page 14: Cyber crime

Cyber Threat Evolution

Virus

Breaking Web Sites

Malicious Code

(Melissa)

Advanced Worm / Trojan (I LOVE

YOU)

Identity Theft (Phishing)

Organised CrimeData Theft, DoS /

DDoS

1995 2000 2003-04 2005-06 2007-081977

Page 15: Cyber crime

New Internet Threats

All computers need internet security

Home users can lose valuable personal data with one click to the wrong website. Children trading games also exchange viruses unknowingly. You receive an email requesting an update to your payment details, and a hacker gains access to your bank account. A backdoor is installed on your machine, and your PC becomes a zombie, spewing out spam.

New technologies - new anti-malware solutions

As cyber threats have evolved, so has software to deflect such threats. Sophisticated antispyware and antivirus solutions capable of detecting the most complex new viruses are now available.

Page 16: Cyber crime

CAN ANYTHING BE DONE?

16

Page 17: Cyber crime

There is no one solution, be it technological or otherwise, to address cyber crime. It exists for a multitude of reasons and requires a multifaceted approach to fight against

17

Page 18: Cyber crime

A FEW WORDS ABOUT SECURITY POLICIES

18

Page 19: Cyber crime

•INDUSTRY POLICIES

Should address acceptable usage, minimum security standards, and commitments by organisation to educate and support users

19

Page 20: Cyber crime

•GOVERNMENT POLICIES

Identify short and mid term security objectives, support to key players, investments in security technology and training, and awareness initiatives

20

Page 21: Cyber crime

QUESTIONSQUESTIONS

21

Page 22: Cyber crime

THANK YOU