SlideShare uma empresa Scribd logo
1 de 32
Copyright of Thinking Hut IT Solutions Pvt Ltd
Cyber Crime & Security
A Primer
Uday Bhaskarwar
thinkinghut@thinkinghut.com
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd4
What is Cyber Crime?
Computer as a Weapon Computer as a Target
A Crime that involves a Computer
Copyright of Thinking Hut IT Solutions Pvt Ltd
First Cyber Crime ~200
years back!!
• In 1820, Joseph-Marie
Jacquard, a
textile manufacturer in
France, produced the
loom. It allowed the
automation in the
weaving of fabrics. His
employees felt that
their traditional
employment was being
threatened. They
sabotaged the
machine to discourage
Jacquard.
The first spam in 1978
• The first spam email
took place in 1978
when it was sent out
over the Arpanet
The first virus in 1982
• The first virus was
installed on an Apple
computer in 1982
when a high school
student, Rich Skrenta,
developed the Elk
Cloner
How old is Cyber Crime?
Copyright of Thinking Hut IT Solutions Pvt Ltd6
How Big is Cyber Crime?
Computer as a Target
Copyright of Thinking Hut IT Solutions Pvt Ltd7
How Big is Cyber Crime?
Computer as a Target
Copyright of Thinking Hut IT Solutions Pvt Ltd
How Big is Cyber Crime?
Copyright of Thinking Hut IT Solutions Pvt Ltd9
Where do we stand?
Computer as a Target
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd11
Levels at which Cyber Crime is committed
Person
Organization
Nation
Copyright of Thinking Hut IT Solutions Pvt Ltd12
It’s just like any other crime…
Cyber
Criminals
Use Tools
&
Techniques
To commit
Cyber
Crimes
Copyright of Thinking Hut IT Solutions Pvt Ltd
Tools - Malicious Software or Malware
13
Ransomware
Copyright of Thinking Hut IT Solutions Pvt Ltd
Types of Cyber Crimes
14
Web Jacking
Copyright of Thinking Hut IT Solutions Pvt Ltd
Types of Cyber Crimes
15
Salami Slicing Computer Vandalism
Cyber Stalking
Data
Diddling
Copyright of Thinking Hut IT Solutions Pvt Ltd
Types of Cyber Crimes
16
Spamming Cyber Trafficking
Child Solicitation
Copyright of Thinking Hut IT Solutions Pvt Ltd
Technique - Phishing
17
Copyright of Thinking Hut IT Solutions Pvt Ltd
Technique - Vishing
18
Copyright of Thinking Hut IT Solutions Pvt Ltd
Technique - Smishing
19
Copyright of Thinking Hut IT Solutions Pvt Ltd
Security Threats in Mobiles
20
Vulnerable
Browser Exploits
WiFi Sniffing
Copyright of Thinking Hut IT Solutions Pvt Ltd
Some interesting Cyber Crimes / Criminals
21
Copyright of Thinking Hut IT Solutions Pvt Ltd
Why is it difficult to detect & crack Cyber Crime?
22
Can be executed remotely
International – difficult for law enforcement
Difficult to defend
Copyright of Thinking Hut IT Solutions Pvt Ltd
How worried should I be?
23
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DOs
24
Long Random String
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DOs
25
Delete Unnecessary Software
Type URLs directly into the address bar
Regularly check
financial
transactions
Register your e-mail and mobile number
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DON’Ts
26
Do not visit unknown websites
Refrain from clicking links
Copyright of Thinking Hut IT Solutions Pvt Ltd
How to Protect Yourself? – DON’Ts
27
• Never reply to emails that seek personal information.
• Never respond to offers of money from abroad.
• Never respond to/ make remittances/ participate in schemes or
offers from unknown entities.
• Never reply to emails or SMS' claiming that the recipient has won a
substantial sum of money in an online lottery or promotion.
• Never fill out forms in email messages that ask for personal financial
information.
• Never click or forward links in an email, instant message, or chat
from unknown senders or if you suspect the authenticity of the
message.
• Never share confidential details like Card number, expiry date, CVV,
OTP, Password with anyone when you receive any unsolicited calls,
SMS, IVR or email.
Copyright of Thinking Hut IT Solutions Pvt Ltd
Remember…
Copyright of Thinking Hut IT Solutions Pvt Ltd
Final Thoughts…
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd
Copyright of Thinking Hut IT Solutions Pvt Ltd
http://www.thinkinghut.com thinkinghut@thinkinghut.com +91-20-6900-0420; +91-89750-03910
Thank You

Mais conteúdo relacionado

Mais procurados

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackersinfosavvy
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranaviVerma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 

Semelhante a Cyber Crime & Security

Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An IntroductionMukesh Tekwani
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 

Semelhante a Cyber Crime & Security (20)

Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Cyber crime by riyaz mulla
Cyber crime by riyaz mullaCyber crime by riyaz mulla
Cyber crime by riyaz mulla
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Cyber Crimes - An Introduction
Cyber Crimes - An IntroductionCyber Crimes - An Introduction
Cyber Crimes - An Introduction
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Computer crime
Computer crimeComputer crime
Computer crime
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
cyber crime
cyber crimecyber crime
cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Hacking3e ppt ch13
Hacking3e ppt ch13Hacking3e ppt ch13
Hacking3e ppt ch13
 

Último

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Cyber Crime & Security

  • 1. Copyright of Thinking Hut IT Solutions Pvt Ltd Cyber Crime & Security A Primer Uday Bhaskarwar thinkinghut@thinkinghut.com
  • 2. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 3. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 4. Copyright of Thinking Hut IT Solutions Pvt Ltd4 What is Cyber Crime? Computer as a Weapon Computer as a Target A Crime that involves a Computer
  • 5. Copyright of Thinking Hut IT Solutions Pvt Ltd First Cyber Crime ~200 years back!! • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. It allowed the automation in the weaving of fabrics. His employees felt that their traditional employment was being threatened. They sabotaged the machine to discourage Jacquard. The first spam in 1978 • The first spam email took place in 1978 when it was sent out over the Arpanet The first virus in 1982 • The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk Cloner How old is Cyber Crime?
  • 6. Copyright of Thinking Hut IT Solutions Pvt Ltd6 How Big is Cyber Crime? Computer as a Target
  • 7. Copyright of Thinking Hut IT Solutions Pvt Ltd7 How Big is Cyber Crime? Computer as a Target
  • 8. Copyright of Thinking Hut IT Solutions Pvt Ltd How Big is Cyber Crime?
  • 9. Copyright of Thinking Hut IT Solutions Pvt Ltd9 Where do we stand? Computer as a Target
  • 10. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 11. Copyright of Thinking Hut IT Solutions Pvt Ltd11 Levels at which Cyber Crime is committed Person Organization Nation
  • 12. Copyright of Thinking Hut IT Solutions Pvt Ltd12 It’s just like any other crime… Cyber Criminals Use Tools & Techniques To commit Cyber Crimes
  • 13. Copyright of Thinking Hut IT Solutions Pvt Ltd Tools - Malicious Software or Malware 13 Ransomware
  • 14. Copyright of Thinking Hut IT Solutions Pvt Ltd Types of Cyber Crimes 14 Web Jacking
  • 15. Copyright of Thinking Hut IT Solutions Pvt Ltd Types of Cyber Crimes 15 Salami Slicing Computer Vandalism Cyber Stalking Data Diddling
  • 16. Copyright of Thinking Hut IT Solutions Pvt Ltd Types of Cyber Crimes 16 Spamming Cyber Trafficking Child Solicitation
  • 17. Copyright of Thinking Hut IT Solutions Pvt Ltd Technique - Phishing 17
  • 18. Copyright of Thinking Hut IT Solutions Pvt Ltd Technique - Vishing 18
  • 19. Copyright of Thinking Hut IT Solutions Pvt Ltd Technique - Smishing 19
  • 20. Copyright of Thinking Hut IT Solutions Pvt Ltd Security Threats in Mobiles 20 Vulnerable Browser Exploits WiFi Sniffing
  • 21. Copyright of Thinking Hut IT Solutions Pvt Ltd Some interesting Cyber Crimes / Criminals 21
  • 22. Copyright of Thinking Hut IT Solutions Pvt Ltd Why is it difficult to detect & crack Cyber Crime? 22 Can be executed remotely International – difficult for law enforcement Difficult to defend
  • 23. Copyright of Thinking Hut IT Solutions Pvt Ltd How worried should I be? 23
  • 24. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DOs 24 Long Random String
  • 25. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DOs 25 Delete Unnecessary Software Type URLs directly into the address bar Regularly check financial transactions Register your e-mail and mobile number
  • 26. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DON’Ts 26 Do not visit unknown websites Refrain from clicking links
  • 27. Copyright of Thinking Hut IT Solutions Pvt Ltd How to Protect Yourself? – DON’Ts 27 • Never reply to emails that seek personal information. • Never respond to offers of money from abroad. • Never respond to/ make remittances/ participate in schemes or offers from unknown entities. • Never reply to emails or SMS' claiming that the recipient has won a substantial sum of money in an online lottery or promotion. • Never fill out forms in email messages that ask for personal financial information. • Never click or forward links in an email, instant message, or chat from unknown senders or if you suspect the authenticity of the message. • Never share confidential details like Card number, expiry date, CVV, OTP, Password with anyone when you receive any unsolicited calls, SMS, IVR or email.
  • 28. Copyright of Thinking Hut IT Solutions Pvt Ltd Remember…
  • 29. Copyright of Thinking Hut IT Solutions Pvt Ltd Final Thoughts…
  • 30. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 31. Copyright of Thinking Hut IT Solutions Pvt Ltd
  • 32. Copyright of Thinking Hut IT Solutions Pvt Ltd http://www.thinkinghut.com thinkinghut@thinkinghut.com +91-20-6900-0420; +91-89750-03910 Thank You