SlideShare a Scribd company logo
1 of 30
W/O SUNETTE POTGIETER
0825569310
WHAT IS CYBER CRIME?
 Cyber crime encompasses any criminal act dealing
with computers and networks. Additionally, cyber
crime also includes traditional crimes conducted
through the Internet. For example; hate crimes,
telemarketing and Internet Fraud, Identity Theft, and
Credit Card Account Thefts are considered to be Cyber
Crimes when the illegal activities are committed
through the use of a computer and the Internet.
HOW HAS THINGS CHANGED:
WHERE IS THE EVIDENCE NOW?
PAST: Physical documents
PRESENT: Data contained in:
- Computers
- Cell phones
- Tablets
PAST: Postal Service
PRESENT: WWW (World Wide Web)
CRIMES
 CARD FRAUD ON INTERNET
 BID OR BUY / EBAY – NON DELIVERY OF
GOODS
 EFT TRANSACTIONS
 PHYSING
 PHARMING
 419 SCAMS
 YOU HAVE WON! SCAMS (RICA)
 OVER DEPOSIT SCAMS (TELKOM, SARS)
CYBER CRIME TERMINOLOGY
 Phishing:
 A technique whereby the perpetrator impersonates
another individual or business through the use of e-mail
or Web sites that copy (or mimic) legitimate e-mail or
Web site characteristics.
 How Phishing works
 This scam uses email or pop-up messages to trick the
victim into disclosing their credit card number, bank
account information, password or other sensitive
information.
 Emails claim to be from a business or organization the
victims know - such as a bank or online payment service
 Spear phishing
 A targeted form of phishing where e-mails or
Web sites are transmitted to an identified
target of the activity, as opposed to the use of
phishing, designed to ensnare targets that
have not been previously identified (i.e.,
spamming). Spear phishing is a form of
social engineering
 Pretexting
 The act of creating and using an invented
scenario (the pretext) to persuade a targeted
victim to release information or perform an
action.
 Pretexting is typically done over the telephone.
It is more than a simple lie, as it often involves
some prior research to set up and use the pieces
of information (e.g., date of birth) to establish
legitimacy and perceived authority in the mind
of the target
 Spoofing
 A scheme in which a person or program
masquerades as another by falsifying data
resulting in the deception of the recipient or user.
 Spoofing takes many forms. Web page spoofing
involves use of a Web page that reproduces the
"look and feel" of a legitimate site, but is under
the control of another for the purpose of
collecting information from a user who believes
they are interacting with the trusted site.
Smishing
A text message is sent to the victim’s
mobile phone that asks the victim to
call a toll-free number.
Once that call is made, they will ask
for personal information such as
Account Number, Credit/Debit card
number.
KEY LOGGERS
 A criminal suspect can install key loggers in
public computers (such as cyber cafes,
airport lounges etc) or the computers of the
victim. Unsuspecting victims would use
these compromised computers to make
online transactions. The credit card
information of the victim would be emailed
to the suspect.
SPYWARE, MALWARE, VIRUSES
 Spyware is a software that aids in gathering
information about a person or organization without
their knowledge and that may send such information
to another entity without the consumer's consent, or
that asserts control over a computer without the
consumer's knowledge.
 Malware, short for malicious software, is software
used or programmed by attackers to disrupt computer
operation, gather sensitive information, or gain access
to private computer systems
 Computer Virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs,
data files, or the boot sector of the hard drive; when
this replication succeeds, the affected areas are then
said to be "infected". Viruses often perform some type
of harmful activity on infected hosts, such as stealing
hard disk space or CPU time, accessing private
information, corrupting data, displaying political or
humorous messages on the user's screen, spamming
their contacts, or logging their keystrokes
THEFT OF PAYMENT
INFORMATION
 TROJAN HORSE : A hacking program, which gains
privileged access to the operating system while
appearing to perform a desirable function.
 Banking Trojans are the most dangerous kind.
 Automatically collects all payment data and
sometimes even conducts financial transactions on the
victims behalf
They capture keystrokes, makes screenshots, bypasses
virtual keyboards, changes hosts files and redirects user
to fake website
LETS LOOK AT A STUDY DONE BY NORTON
DURING 2012.
And some Internet Security Tips
CYBER CRIME GOES
MOBILE
MOBILE DEVICES
 PC’s Still remain the Primary targets, but cyber
criminals are also finding ways to attack
consumers on mobile devices
 McAfee found 13000 different types of Mobile
malware in 2012 compared to 2000 in 2011
SECURITY
 There exists various applications for smartphones
whereby they can remotely locate, lock and even
wipe data from a misplaced or lost device
 Data can also be backed up to a Cloud
 A huge part of our lives are contained in these
small devices
 More and more personal and valuable information
is stored on these devices such as banking
particulars, personal particulars, passwords.
 Are we really aware of how valuable such
information is to a criminal?
Mobile year in review
Cyber Crime goes Mobile
SAFE GAURDS
 PASSWORDS:
• Passwords protect your stuff
• A good password stops a hacker in his/her tracks
• A good password doesn’t make you crazy trying
to remember it
• A good password strategy = peace of mind
POPULAR PASSWORDS
12345
123456
1234567
12345678
123123
111111
Password
Passw0rd
Password1
Abc123
Monkey
Trustn01
Dragon
Baseball
Iloveyou
Master
Sunshine
Qazwsx
Superman
Michael
Football
Ashley
Bailey
Shadow
Letmein
Blink182
Admin1
Think Unique
• Not guessable word or phrase
• Different for each site and account
• Some use a few complex passwords and then one
“master” passwords for accounts considered
unimportant
• All accounts are important
• Not password that anyone else would use
No Dictionary Words
 Avoid using full words you might find in a
dictionary
 Real words can be “edited” for password use
 Dictionary becomes
 D1(t10nAry (as an example)
 But hackers are “on to” common letter replacement
tricks like these
No Pet Names
 Children often use their pet’s name
 Friends and siblings hack accounts this way
 Security Questions and Answers should be
hard to guess
 You can use “fake” answers to “mother’s
maiden name” but you’ll need to remember
what you used
 Better are sites that let you create your own
questions
Pay Particular Attention to Most
Important Accounts
 Email is most important
 “Forgot your password” link on sites goes to
email
 Hacker with access to email can reset all other
accounts
 Nearly as important is social networking
 Hacker can run scams against friends and
colleagues
 Financial sites and shopping sites with stored
credit cards, too
Never Share or Show Passwords
 Don’t write them down
 Never email or text them to someone
 If you tell it to someone, change the password as
soon as possible
 Legitimate companies NEVER ask for your account
password
INTERNET SECURITY
 Get a security product for all devices:
 Computers
 Mobile phones
 Tablets
 Prevent password-stealing malware from infecting
your device
Secure Mobile Devices with a
Password
 Mobile apps may auto log you in to accounts
 Protect access with a password on phone or tablet
 Remove apps you don’t use anymore that may have
credit cards or financial info store:
 Shopping sites
 Banking and Investment companies
 Travel sites
TO SUM UP…
 Create unique passphrase (no dictionary words)
 Nothing others will guess
 Customize for each site
 Focus on email, social, financial sites first
 Use password managers
 Never share or show passwords
 Take action if breached
 Use security software
 Set passwords on mobiles
THANK YOU

More Related Content

What's hot

Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icaiMayank Garg
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe TNS Group
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)marie120206
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safeaaberra
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 

What's hot (20)

Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Bi
BiBi
Bi
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Facebook
FacebookFacebook
Facebook
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icai
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 

Similar to Cyber crime

S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHemantSharma134028
 
Data theft
Data theftData theft
Data theftLaura
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 

Similar to Cyber crime (20)

cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data theft
Data theftData theft
Data theft
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 

More from Durban Chamber of Commerce and Industry

Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Durban Chamber of Commerce and Industry
 

More from Durban Chamber of Commerce and Industry (20)

SUMMARY AMENDED CCMA RULES
SUMMARY AMENDED CCMA RULESSUMMARY AMENDED CCMA RULES
SUMMARY AMENDED CCMA RULES
 
201507 caisson repair project final
201507 caisson repair project final201507 caisson repair project final
201507 caisson repair project final
 
Simply biz shift questions with allon dbn 2 v2
Simply biz shift questions with allon dbn 2 v2Simply biz shift questions with allon dbn 2 v2
Simply biz shift questions with allon dbn 2 v2
 
Speakers' profiles
Speakers' profilesSpeakers' profiles
Speakers' profiles
 
Mail shot wom. conv. a4
Mail shot   wom. conv. a4Mail shot   wom. conv. a4
Mail shot wom. conv. a4
 
Talk sign a5 flyer 2015
Talk sign a5 flyer 2015Talk sign a5 flyer 2015
Talk sign a5 flyer 2015
 
ethekwini municipality 2013 2014 annual report
ethekwini municipality 2013 2014 annual reportethekwini municipality 2013 2014 annual report
ethekwini municipality 2013 2014 annual report
 
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
 
Sefa breakfast session presentation
Sefa breakfast session presentationSefa breakfast session presentation
Sefa breakfast session presentation
 
Invitation letter to careers expo 2015
Invitation letter to careers expo 2015Invitation letter to careers expo 2015
Invitation letter to careers expo 2015
 
Invitation to submit tenders to organise the sacci annual convention
Invitation to submit tenders to organise the sacci annual conventionInvitation to submit tenders to organise the sacci annual convention
Invitation to submit tenders to organise the sacci annual convention
 
Media release phoenix ink business directory approved 13 jan2015
Media release phoenix ink business directory approved 13 jan2015Media release phoenix ink business directory approved 13 jan2015
Media release phoenix ink business directory approved 13 jan2015
 
Daily market commentary 10122014
Daily market commentary 10122014Daily market commentary 10122014
Daily market commentary 10122014
 
Invitation
InvitationInvitation
Invitation
 
Daily market commentary 11112014
Daily market commentary 11112014Daily market commentary 11112014
Daily market commentary 11112014
 
Daily market commentary 10102014
Daily market commentary  10102014Daily market commentary  10102014
Daily market commentary 10102014
 
Jirah article 2014
Jirah article 2014Jirah article 2014
Jirah article 2014
 
KZN Infrastructure Funding Fair
KZN Infrastructure Funding Fair KZN Infrastructure Funding Fair
KZN Infrastructure Funding Fair
 
Gibela supplier specs
Gibela supplier specs Gibela supplier specs
Gibela supplier specs
 
Tongaat Hullett - Durban Investment Roadshow
Tongaat Hullett - Durban Investment RoadshowTongaat Hullett - Durban Investment Roadshow
Tongaat Hullett - Durban Investment Roadshow
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Cyber crime

  • 2. WHAT IS CYBER CRIME?  Cyber crime encompasses any criminal act dealing with computers and networks. Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet Fraud, Identity Theft, and Credit Card Account Thefts are considered to be Cyber Crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 3. HOW HAS THINGS CHANGED: WHERE IS THE EVIDENCE NOW? PAST: Physical documents PRESENT: Data contained in: - Computers - Cell phones - Tablets PAST: Postal Service PRESENT: WWW (World Wide Web)
  • 4. CRIMES  CARD FRAUD ON INTERNET  BID OR BUY / EBAY – NON DELIVERY OF GOODS  EFT TRANSACTIONS  PHYSING  PHARMING  419 SCAMS  YOU HAVE WON! SCAMS (RICA)  OVER DEPOSIT SCAMS (TELKOM, SARS)
  • 5. CYBER CRIME TERMINOLOGY  Phishing:  A technique whereby the perpetrator impersonates another individual or business through the use of e-mail or Web sites that copy (or mimic) legitimate e-mail or Web site characteristics.  How Phishing works  This scam uses email or pop-up messages to trick the victim into disclosing their credit card number, bank account information, password or other sensitive information.  Emails claim to be from a business or organization the victims know - such as a bank or online payment service
  • 6.  Spear phishing  A targeted form of phishing where e-mails or Web sites are transmitted to an identified target of the activity, as opposed to the use of phishing, designed to ensnare targets that have not been previously identified (i.e., spamming). Spear phishing is a form of social engineering
  • 7.  Pretexting  The act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action.  Pretexting is typically done over the telephone. It is more than a simple lie, as it often involves some prior research to set up and use the pieces of information (e.g., date of birth) to establish legitimacy and perceived authority in the mind of the target
  • 8.  Spoofing  A scheme in which a person or program masquerades as another by falsifying data resulting in the deception of the recipient or user.  Spoofing takes many forms. Web page spoofing involves use of a Web page that reproduces the "look and feel" of a legitimate site, but is under the control of another for the purpose of collecting information from a user who believes they are interacting with the trusted site.
  • 9.
  • 10. Smishing A text message is sent to the victim’s mobile phone that asks the victim to call a toll-free number. Once that call is made, they will ask for personal information such as Account Number, Credit/Debit card number.
  • 11. KEY LOGGERS  A criminal suspect can install key loggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these compromised computers to make online transactions. The credit card information of the victim would be emailed to the suspect.
  • 12. SPYWARE, MALWARE, VIRUSES  Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.  Malware, short for malicious software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems
  • 13.  Computer Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes
  • 14. THEFT OF PAYMENT INFORMATION  TROJAN HORSE : A hacking program, which gains privileged access to the operating system while appearing to perform a desirable function.  Banking Trojans are the most dangerous kind.  Automatically collects all payment data and sometimes even conducts financial transactions on the victims behalf They capture keystrokes, makes screenshots, bypasses virtual keyboards, changes hosts files and redirects user to fake website
  • 15. LETS LOOK AT A STUDY DONE BY NORTON DURING 2012. And some Internet Security Tips
  • 17. MOBILE DEVICES  PC’s Still remain the Primary targets, but cyber criminals are also finding ways to attack consumers on mobile devices  McAfee found 13000 different types of Mobile malware in 2012 compared to 2000 in 2011
  • 18. SECURITY  There exists various applications for smartphones whereby they can remotely locate, lock and even wipe data from a misplaced or lost device  Data can also be backed up to a Cloud  A huge part of our lives are contained in these small devices  More and more personal and valuable information is stored on these devices such as banking particulars, personal particulars, passwords.  Are we really aware of how valuable such information is to a criminal?
  • 19. Mobile year in review Cyber Crime goes Mobile
  • 20. SAFE GAURDS  PASSWORDS: • Passwords protect your stuff • A good password stops a hacker in his/her tracks • A good password doesn’t make you crazy trying to remember it • A good password strategy = peace of mind
  • 22. Think Unique • Not guessable word or phrase • Different for each site and account • Some use a few complex passwords and then one “master” passwords for accounts considered unimportant • All accounts are important • Not password that anyone else would use
  • 23. No Dictionary Words  Avoid using full words you might find in a dictionary  Real words can be “edited” for password use  Dictionary becomes  D1(t10nAry (as an example)  But hackers are “on to” common letter replacement tricks like these
  • 24. No Pet Names  Children often use their pet’s name  Friends and siblings hack accounts this way  Security Questions and Answers should be hard to guess  You can use “fake” answers to “mother’s maiden name” but you’ll need to remember what you used  Better are sites that let you create your own questions
  • 25. Pay Particular Attention to Most Important Accounts  Email is most important  “Forgot your password” link on sites goes to email  Hacker with access to email can reset all other accounts  Nearly as important is social networking  Hacker can run scams against friends and colleagues  Financial sites and shopping sites with stored credit cards, too
  • 26. Never Share or Show Passwords  Don’t write them down  Never email or text them to someone  If you tell it to someone, change the password as soon as possible  Legitimate companies NEVER ask for your account password
  • 27. INTERNET SECURITY  Get a security product for all devices:  Computers  Mobile phones  Tablets  Prevent password-stealing malware from infecting your device
  • 28. Secure Mobile Devices with a Password  Mobile apps may auto log you in to accounts  Protect access with a password on phone or tablet  Remove apps you don’t use anymore that may have credit cards or financial info store:  Shopping sites  Banking and Investment companies  Travel sites
  • 29. TO SUM UP…  Create unique passphrase (no dictionary words)  Nothing others will guess  Customize for each site  Focus on email, social, financial sites first  Use password managers  Never share or show passwords  Take action if breached  Use security software  Set passwords on mobiles