SlideShare a Scribd company logo
1 of 28
Cybersecurity
-A CASE
STUDY
Meaning
• Cybercrime is any criminal activity that involves a
computer, networked device or a network. While most
cybercrimes are carried out in order to generate profit for
the cybercriminals, some cybercrimes are carried out
against computers or devices directly to damage or
disable them, while others use computers or networks to
spread malware, illegal information, images or other
materials. Some cybercrimes do both -- i.e., target
computers to infect them with viruses, which are then
spread to other machines and, sometimes, entire networks.
RANSOMWARE IS A TYPE OF
MALICIOUS SOFTWARE, OR
MALWARE, DESIGNED TO DENY
ACCESS TO A COMPUTER
SYSTEM OR DATA UNTIL A
RANSOM IS
PAID. RANSOMWARE TYPICALLY
SPREADS THROUGH PHISHING
EMAILS OR BY UNKNOWINGLY
VISITING AN INFECTED
WEBSITE. RANSOMWARE CAN
BE DEVASTATING TO AN
INDIVIDUAL OR AN
ORGANIZATION.
SOLETSGOTOONEOF BIGGESTSOURCE WHERE
MOSTOF CYBERCRIMEHAPPEN
UNDERSTANDING DARKWEB AND
TOR
LAYERS OF INTERNET
What is the DARKweb?
 All information that cannot be indexed using
general web search engines
 Also known as the deep internet, deepnet, or the
hidden web
Content Found On The Invisible Web
•Private web
•CHILD PONOGRAPHY
••Unlinked content
••Scripted content
••Limited access content
••Databases
•HACKED BANK ACCOUNTS
Advantages Of DARK Web
Content
 Specialized content focus – large amounts of
information focused on an exact subject
 Contains information that might not be available
on the visible web
 Allows a user to find a precise answer to a
specific question
 Allows a user to find webpages from a specific
date or time
So what is actually on the Deep
Web,
and how do we get there?
Deep Web (layer two)
- Content that is only available through
specialized anonymizing software (Tor). This includes
anonymity networks and darknets (anonymous P2P). This are is
a sort of safe- haven for speech and content which has been
banned from the surface web.
- examples: Anonymous chat/imageboards. CP, drugs,
illegal transactions, weapons, DRM removal software, pirated
software/media/ books, black markets.
.onion:
-onion is a domain host suffix designating an anonymous hidden
service reachable via the Tor network.
-The purpose of using such a system is to make both the
information provider and the person accessing theinformation
more difficult to trace, whether by one another, by an intermediate
network host, or by an outsider.
-.onion adresses are 16-character non-mneumonichashes,
compromised of alphabetic and numeric strings.
-The "onion" name refers to onion routing, the technique used by
Tor to achieve a degree of anonymity.
Accessing the Deep Web
Accessing the Deep Web
Tor:
-” The Tor software protects you by bouncing your
communications around a distributed network of relays run by
volunteers all around the world: it prevents somebody watching
your Internet connection from learning what sites you visit, it
prevents the sites you visit from learning your physical location,
and it lets you access sites which are blocked.” –
www.torproject.org
-Tor is a network that supports onion routing; a way to
help make your traffic anonymous. Because the Deep Web is
compromised of information that doesn’t show up on search
engines, or has no domain name registry, you must know
exactly where you are going to get there.
The first step is to download, install, and run the Tor Bundle. This will bring up your new
anonymous browser (through Firefox) in order to get started.
Currency of the Deep Web
Bitcoins:
-an electronic cash system using peer-to-peer networking, digital
signatures and cryptographic proof to enable irreversible payments
between parties without relying on trust. Payments are issued and
transferred by the Bitcoin network.
-Participants begin using Bitcoin by first acquiring a Bitcoin wallet
and one or more Bitcoin addresses. Bitcoin addresses are used for
receiving Bitcoins, similar to how e-mail addresses are used for
receiving e-mail.
-In April 2012, 1 BTC traded at around $4.80. Taking into account
the total number of Bitcoins in circulation, the market capitalization
of the Bitcoin network stands at over 40 million USD
Guided Journey Through the Deep Web
The deep web is vast, as we covered before, and most is private.
Here we will go through some examples of websites on the Deep
Web, how online currency works, and the various resources the
Deep Web encompasses (not all entirely legal)
This content can be disturbing. Obviously with great resources such
as free library databases, and banned books, comes information
that is considered scat. Being a safe-haven from the censorship of
the surface web, there is a lot of CP, arms/drug trade, and other
illegal information on the Deep Web. It’s up to you as an individual
to steer clear of what you don’t want to see.
In addition, one must also be skeptical. There are even sites
dedicated to contract killing, but one can’t be sure that these
websites are even serious.
The next step is to access the Hidden Wiki, which most people consider the home page of the Deep
Web. Here you can begin your journey and discover many different types of sites and networks,
ranging from tame to very illegal. There are black market type sites, hacking information sites, huge
file databases, political advocacy sites, and even sites to hire people to engage in illegal activity.
One of the other “main pages” of the Deep Web is TorDir. TorDir is a site that uses a special
crawler for the Deep Web, so that it may act similar to Google in that it categorizes web sites,
and allows you to view many different and obscure .onion sites that fall into each category.
Through the Hidden Wiki you can find pages like this, which are semi-organized lists of different
.onion sites. Many different sites are listed and separated based on function, such as
buying/selling/trading, communication, hacking, or intel exchange.
This is an example of one of the many online black markets. This one did not require a
paid membership. There are many different ways to spend bit coins, such as on apparel,
money transfers, drugs, books, and even digital goods.
This is an example of someone’s own personal page, with content picked out due to it’s
controversial nature. Here you can find anything from banned readings, to trefelling.
There is content on making one’s own explosives, and many different military type
documents and guidebooks.
There is a huge portion of the Deep Web that is not malicious at all. This is a huge
database of banned, black listed, and forbidden books which you can read and
download. Books have been burned in the past and banned for their controversial
subject matter, and this is a way for history to be preserved.
Another scholarly database, this .onion site is a compilation of financial, business, real
estate, and even marketing tools and texts free to anyone who wants to download them.
The Deep Web is a great archive for educational material.
The Deep Web is full of malicious content. On this Russian-based community hacking
website, one can purchase credit card information, PayPal account information, bank
accounts, and even the service of DDoSing a website. This is when the website is
overloaded with information sent to it, and eventually is forced to shut down.
SOME DISTURBING
VIDEOS
SOME TRUE DARKWEB FACTS
DangersoftheDARKWeb
If you decide to look into the Deep Web on your own
volition, make sure to be careful.
-Have anti-virus protection.
-Have a paid vpn
-Be intelligent about what links you click. The
Deep Web is a haven for Phishers.
-If you don’t want to see any disturbing images
or content, simply browse as text-only.
SHUBH THAKKAR

CREDITS :

More Related Content

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber crime- a case study

Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 

Similar to Cyber crime- a case study (20)

Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Darknet
DarknetDarknet
Darknet
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Deep web
Deep webDeep web
Deep web
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyber crime- a case study

  • 2. Meaning • Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers to infect them with viruses, which are then spread to other machines and, sometimes, entire networks.
  • 3. RANSOMWARE IS A TYPE OF MALICIOUS SOFTWARE, OR MALWARE, DESIGNED TO DENY ACCESS TO A COMPUTER SYSTEM OR DATA UNTIL A RANSOM IS PAID. RANSOMWARE TYPICALLY SPREADS THROUGH PHISHING EMAILS OR BY UNKNOWINGLY VISITING AN INFECTED WEBSITE. RANSOMWARE CAN BE DEVASTATING TO AN INDIVIDUAL OR AN ORGANIZATION.
  • 6.
  • 8. What is the DARKweb?  All information that cannot be indexed using general web search engines  Also known as the deep internet, deepnet, or the hidden web
  • 9. Content Found On The Invisible Web •Private web •CHILD PONOGRAPHY ••Unlinked content ••Scripted content ••Limited access content ••Databases •HACKED BANK ACCOUNTS
  • 10. Advantages Of DARK Web Content  Specialized content focus – large amounts of information focused on an exact subject  Contains information that might not be available on the visible web  Allows a user to find a precise answer to a specific question  Allows a user to find webpages from a specific date or time
  • 11. So what is actually on the Deep Web, and how do we get there? Deep Web (layer two) - Content that is only available through specialized anonymizing software (Tor). This includes anonymity networks and darknets (anonymous P2P). This are is a sort of safe- haven for speech and content which has been banned from the surface web. - examples: Anonymous chat/imageboards. CP, drugs, illegal transactions, weapons, DRM removal software, pirated software/media/ books, black markets.
  • 12. .onion: -onion is a domain host suffix designating an anonymous hidden service reachable via the Tor network. -The purpose of using such a system is to make both the information provider and the person accessing theinformation more difficult to trace, whether by one another, by an intermediate network host, or by an outsider. -.onion adresses are 16-character non-mneumonichashes, compromised of alphabetic and numeric strings. -The "onion" name refers to onion routing, the technique used by Tor to achieve a degree of anonymity. Accessing the Deep Web
  • 13. Accessing the Deep Web Tor: -” The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.” – www.torproject.org -Tor is a network that supports onion routing; a way to help make your traffic anonymous. Because the Deep Web is compromised of information that doesn’t show up on search engines, or has no domain name registry, you must know exactly where you are going to get there.
  • 14. The first step is to download, install, and run the Tor Bundle. This will bring up your new anonymous browser (through Firefox) in order to get started.
  • 15. Currency of the Deep Web Bitcoins: -an electronic cash system using peer-to-peer networking, digital signatures and cryptographic proof to enable irreversible payments between parties without relying on trust. Payments are issued and transferred by the Bitcoin network. -Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one or more Bitcoin addresses. Bitcoin addresses are used for receiving Bitcoins, similar to how e-mail addresses are used for receiving e-mail. -In April 2012, 1 BTC traded at around $4.80. Taking into account the total number of Bitcoins in circulation, the market capitalization of the Bitcoin network stands at over 40 million USD
  • 16. Guided Journey Through the Deep Web The deep web is vast, as we covered before, and most is private. Here we will go through some examples of websites on the Deep Web, how online currency works, and the various resources the Deep Web encompasses (not all entirely legal) This content can be disturbing. Obviously with great resources such as free library databases, and banned books, comes information that is considered scat. Being a safe-haven from the censorship of the surface web, there is a lot of CP, arms/drug trade, and other illegal information on the Deep Web. It’s up to you as an individual to steer clear of what you don’t want to see. In addition, one must also be skeptical. There are even sites dedicated to contract killing, but one can’t be sure that these websites are even serious.
  • 17. The next step is to access the Hidden Wiki, which most people consider the home page of the Deep Web. Here you can begin your journey and discover many different types of sites and networks, ranging from tame to very illegal. There are black market type sites, hacking information sites, huge file databases, political advocacy sites, and even sites to hire people to engage in illegal activity.
  • 18. One of the other “main pages” of the Deep Web is TorDir. TorDir is a site that uses a special crawler for the Deep Web, so that it may act similar to Google in that it categorizes web sites, and allows you to view many different and obscure .onion sites that fall into each category.
  • 19. Through the Hidden Wiki you can find pages like this, which are semi-organized lists of different .onion sites. Many different sites are listed and separated based on function, such as buying/selling/trading, communication, hacking, or intel exchange.
  • 20. This is an example of one of the many online black markets. This one did not require a paid membership. There are many different ways to spend bit coins, such as on apparel, money transfers, drugs, books, and even digital goods.
  • 21. This is an example of someone’s own personal page, with content picked out due to it’s controversial nature. Here you can find anything from banned readings, to trefelling. There is content on making one’s own explosives, and many different military type documents and guidebooks.
  • 22. There is a huge portion of the Deep Web that is not malicious at all. This is a huge database of banned, black listed, and forbidden books which you can read and download. Books have been burned in the past and banned for their controversial subject matter, and this is a way for history to be preserved.
  • 23. Another scholarly database, this .onion site is a compilation of financial, business, real estate, and even marketing tools and texts free to anyone who wants to download them. The Deep Web is a great archive for educational material.
  • 24. The Deep Web is full of malicious content. On this Russian-based community hacking website, one can purchase credit card information, PayPal account information, bank accounts, and even the service of DDoSing a website. This is when the website is overloaded with information sent to it, and eventually is forced to shut down.
  • 27. DangersoftheDARKWeb If you decide to look into the Deep Web on your own volition, make sure to be careful. -Have anti-virus protection. -Have a paid vpn -Be intelligent about what links you click. The Deep Web is a haven for Phishers. -If you don’t want to see any disturbing images or content, simply browse as text-only.