0% found this document useful (0 votes)
215 views24 pages

Module-3: Cybercrime: Mobile and Wireless Devices

This document discusses mobile and wireless cybercrime topics including: 1. The proliferation of mobile devices and wireless connectivity in areas like manufacturing, healthcare, and the military. Early mobile devices included Blackberries and PDAs. 2. The types of mobile computers that now exist, including tablets, smartphones, and ultraportables. Trends show people are more aware of mobile security risks but wireless devices have increased accessibility. 3. Common attacks against mobile networks include malware, denial of service attacks, and spoofing. Credit card fraud is also discussed in the mobile era through practices like triangulation scams. Tips are provided to help prevent fraud and protect personal information.

Uploaded by

akshatha7070
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
215 views24 pages

Module-3: Cybercrime: Mobile and Wireless Devices

This document discusses mobile and wireless cybercrime topics including: 1. The proliferation of mobile devices and wireless connectivity in areas like manufacturing, healthcare, and the military. Early mobile devices included Blackberries and PDAs. 2. The types of mobile computers that now exist, including tablets, smartphones, and ultraportables. Trends show people are more aware of mobile security risks but wireless devices have increased accessibility. 3. Common attacks against mobile networks include malware, denial of service attacks, and spoofing. Credit card fraud is also discussed in the mobile era through practices like triangulation scams. Tips are provided to help prevent fraud and protect personal information.

Uploaded by

akshatha7070
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Module-3

Cybercrime:
Mobile and
Wireless
Devices
Topic: 3.1, 3.2, 3.3, 3.4, 3.8
• Wireless networks, allowing communications from
any device, anywhere and anytime
• Manufacturing
• Healthcare
• Military

3.1 • personal entertainment


• Remote connection extended from fixed dial-in to

Introduction wireless-on-the-move devices.


• Smartphones + Wireless and mobile devices =
Business Tool
• Research in Motion [RIM] Blackberry Wireless
Hand-held device.
3.2 • Years ago, the Choice was
Proliferation between wireless phone and
simple PDA, but now the trend
of Mobile and need high-end PDA.
Wireless
Devices
• Portable Computers

Types of • Tablet PC
• Internet Tablet
Mobile • Personal Digital Assistant
Computers • Ultramobile PC
• Smartphone
3.3
Trends in
Mobility
Key Findings of Mobile
Computing Security Scenario

• With usage experience, awareness of mobile


uses gets enhanced
• People continue to remain the weakest link
for laptop security
• Wireless connectivity does little to increase
burden of managing Laptop.
• Laptop experience changes the view of
starting a smart hand-held pilot
• There is naivety and/or neglect in smart
handheld security
• Rules rather than technology keep smart
handhelds usage in check
Popular • Malwares, Virus and Worms
• Skull Trojan

attacks
• Cabir Worm
• Mosquito Trojan
• Denial-of-Service
against 3G • Overbilling Attack

Mobile
• Spoofed Policy Development Process
• Signaling Level Attack

Networks
• Trends coming-up with mobile computing:
• M-Commerce
3.4 • M-Banking

Credit Card • Mobile Credit Card transactions are very common with
low cost mobile technology with point of scale terminal
Frauds in • Anywhere Anytime Computing

Mobile and • Wireless Credit Card processing helps to process


transactions from mobile locations
Computing
Era
Online Environment in Credit Card Transactions
Tips to prevent Credit Card Frauds

• DO’s
Tips to prevent Credit Card Frauds
• Dont’s
Merchant sends a transaction to bank

The bank transmits the request to the


Closed Loop authorized cardholder
Environment The Cardholder approves or rejects
for Wireless
[CLEW] The bank/Merchant is notified

The credit card transaction is


completed
Types and Techniques of Credit Card
Fraud
• Paper based Fraud – application fraud[1. ID Theft, 2. Financial Fraud]
• Skimming the information on magnetic strip or data
stored on the smart chip

Modern • Phishing- Site cloning or creating false merchant sites


• Triangulation:
Technique: • Discounted goods and appears to be a legitimate
merchandise website.
Triangulation • Customer registers and provides Credit Card details.
• The criminal orders from the legitimate website
with the Customers details.
• The goods are shipped to the customer and the
transaction is done.
• The criminal keeps purchasing using stolen Credit
Cards of different customers till the criminal closes
the website and starts a new one.
Credit Card • Software that creates valid credit card
numbers and expiry dates.
Generators
Attacks on Mobile/ Cellphone

• Outbreak on mobile devices:


• Enough target terminals
• Enough functionality
• Enough connectivity
• Mobile Viruses
• Mishing
• Smishing
• Vishing
• Hacking Blutooth
Mobile Viruses

How to protect:
• Download or Accept programs from only trusted sites.
• If a mobile is equipped with Bluetooth, turn it OFF or
set it to non discoverable mode when not in use.
• If the mobile is equipped with beam, allow it to receive
incoming beams, only from the trusted source.
• Download and install antivirus software for mobile
devices.
Mishing

Mobile_Phone + Phishing = M-Commerce has its


Mishing contribution
Vishing

Using Social Vishing includes:


Engineering to gain • ID Theft
access to personal • Purchasing luxury
and financial goods and services
• Transferring money or
information from funds
the public for • Monitoring the victims
reward. bank accounts.
How Vishing Works

Internet E-mail Mobile text Voice mail Direct Phone call


messaging
• SMS Phishing
• Reward SMS/ Gaming SMS

• How to protect from Smishing attack:


Smishing • Do not respond to any message asking for
personal information
• Avoid calling any number as mentioned in
the message.
• Never click on any link if the SMS is sent by
an unknown number.
Hacking • Open Wireless technology standard over
short distance.

Bluetooth
• Bluetooth Hacking Tool
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy