Cybercrime: Presented By: Pratap Chavan
Cybercrime: Presented By: Pratap Chavan
2
Introduction
Today an increasing number of companies are connecting to the Internet to support sales
activities or to provide their employees and customers with faster information and
services. The virtual world has taken over the real one, E-business and E-commerce,
which are the new mantras and electronic transactions and dominate the overall business
paradigm.
3
1. Objectives
Objective 1: Safeguard national critical information infrastructure (CII)
Objective 2: Respond to, resolve, and recover from cyber incidents and attacks through timely
information sharing, collaboration, and action
Objective 3: Establish a legal and regulatory framework to enable a safe and vibrant cyberspace
Objective 4: Foster a culture of cyber security that promotes safe and appropriate use
of cyberspace
Objective 5: Develop and cultivate national cyber security capabilities
Types of cyber crime
1.Hacking
2. Virus dissemination
“
3. Logic bombs
4. Denial-of-Service attack
5. Phishing
6. Email bombing and spamming
7. Web jacking
8. Cyber Stalking
9. Identity Theft
10.Credit card fraud
11. Salami Attack
12. Software piracy
5
1.Hacking
✔ SQL Injections: An SQL injection is a technique that allows hackers to play upon the security vulnerabilities of the
software that runs a web site. It can be used to attack any type of unprotected or improperly protected SQL
database. This process involves entering portions of SQL code into a web form entry field – most commonly
usernames and passwords – to give the hacker further access to the site backend, or to a particular
✔ Theft of FTP Passwords: This is another very common way to tamper with web sites. FTP password hacking takes
advantage of the fact that many webmasters store their website login information on their poorly protected PCs. The
thief searches the victim’s system for FTP login details, and then relays them to his own remote computer. He then
logs into the web site via the remote computer and modifies the web pages as he or she pleases.
✔ Cross-site scripting:
Also known as XSS (formerly CSS, but renamed due to confusion with cascading style sheets), is a very easy way
of circumventing a security system. Cross-site scripting is a hard-to-find loophole in a web site, making it
vulnerable to attack. In a typical XSS attack, the hacker infects a web page with a malicious client-side script or
program. When you visit this web page, the script is automatically downloaded to your browser and executed.
Typically, attackers inject HTML, JavaScript, VBScript, ActiveX or Flash into a vulnerable application to deceive
you and gather confidential information. If you want to protect your PC from malicious hackers, investing in a good
firewall should be first and foremost. Hacking is done through a network, so it’s very important to stay safe while
using the internet.
6
2. Virus dissemination
✔ Viruses are computer programs that attach themselves to or infect a system
or files, and have a tendency to circulate to other computers on a network.
They disrupt the computer operation and affect the data stored – either by
modifying it or by deleting it altogether. “Worms” unlike viruses don’t need
a host to cling on to. They merely replicate until they eat up all available
memory in the system. The term “worm” is sometimes used to mean
selfreplicating “malware” (MALicious softWARE). These terms are often
used interchangeably in the context of the hybrid viruses/worms that
dominate
7
3.Logic Bombs
A logic bomb, also known as “slag code”, is a malicious piece of code which
is intentionally inserted into software to execute a malicious task when
triggered by a specific event. It’s not a virus, although it usually behaves in a
similar manner. It is stealthily inserted into the program where it lies
dormant until specified conditions are met. Malicious software such as
viruses and worms often contain logic bombs which are triggered at a
specific payload or at a predefined time. The payload of a logic bomb is
unknown to the user of the software, and the task that it executes unwanted.
8
4.Denial of service attack
A Denial-of-Service (DoS) attack is an explicit attempt by attackers to deny
service to intended users of that service. It involves flooding a computer
resource with more requests than it can handle consuming its available
bandwidth which results in server overload. This causes the resource (e.g. a
web server) to crash or slow down significantly so that no one can access it.
Using this technique, the attacker can render a web site inoperable by
sending massive amounts of traffic to the targeted site. A site may
temporarily malfunction or crash completely, in any case resulting in
inability of the system to communicate adequately. DoS attacks violate the
acceptable use policies of virtually all internet service providers. 9
Phishing
This a technique of extracting confidential information such as credit card numbers and username password
combos by masquerading as a legitimate enterprise. Phishing is typically carried out by email spoofing. You’ve
probably received email containing links to legitimate appearing websites
10
How to secure computer
1.Everything up to date
2.Use Strong and Unique passwords
3. Enable multi-factor authentication
4. Encrypt and back up your most important data
5. Be careful using public Wi-Fi
11
Disadvantages
✔ Firewalls can be difficult to configure correctly.
✔ Incorrectly configured firewalls may block users from
performing certain actions on the Internet, until the firewall
configured correctly.
✔ Makes the system slower than before.
✔ Need to keep updating the new software in order to keep
security up to date.
✔ Could be costly for average user.
12
Conclusion
Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary,
and they don't always occur behind the computer, but they executed by computer. The hacker's
identity is ranged between 12 years young to 67years old. The hacker could live three continents
away from its victim, and they wouldn’t even know they were being hacked. Crimes done behind the
computer are the 21st century's problem. With the technology increasing, criminals don't have to
rob banks, nor do they have to be outside in order to commit any crime. They have everything they
need on their lap. Their weapons aren't guns anymore; they attack with mouse cursors and
passwords.
13
Thank
s!
Any questions?
14