TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
CYBER CRIME AND SECURITY
1. CYBER CRIME AND SECURITY
If we can defeat them sitting at
home……who needs to fight with tanks
and guns!!!!
Presented By
Eng. Md.Tawhidur Rahman Pial
CCNA,CCNA-SEC,CCNP,
C|EH,CHFI,CNDA, E|CSA, L|PT, E|NSA, WiMAX+
,Telecom+, Network+, Security+, Linux+
Consultant of Cyber Crime & Digital Forensic
Visiting Scholar , Dept of IICT , BUET
2. CONTENTS
Introduction.
Definition.
History.
Cyber threat evolution.
Categories of cyber crime.
Types of cyber crime.
Prevention.
Security.
Conclusion.
3. INTRODUCTION
The internet in Bangladesh is growing rapidly. It has
given rise to new opportunities in every field we can
think of be it entertainment, business, sports or
education.
There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
4. Modern Day Crimes- Transnational crime
syndicates
What Is organized Crime?
Network of criminals working across the borders to synchronize criminal
activities such as extortion, drug trafficking, Human Trafficking,
Smuggling, cybercrime, etc.
THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The
Odessa Mafia.
THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).
THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)
THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai.
According to FBI Transnational Organized criminal Syndicates are venturing
into the world of cyber crime diverting their attention from the traditional
methods. They are hiring top class hackers from all over the globe. The
interpol suggests that the Russian Mafia are one of the pioneers of the
international Cyber crime industry. Their strength and influence has lead
to rise in terror throughout the cyber world.
6. HISTORY
• The first recorded cyber crime took place in the
year 1820.
• The first spam email took place in 1978 when it
was sent over the Arpanet.
• The first Virus was installed on an Apple
Computer in 1982.
9. TYPES OF CYBER CRIME
• Hacking
• Denial of service attack
• Virus Dissemination
• Computer Vandalism
• Cyber Terrorism
• Technology Crime
10. HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
11. DENIAL OF SERVICE ATTACK
• Act by the criminal, who floods the
bandwidth of the victims network.
• Is his e-mail box with spam mail depriving
him of the services.
12. VIRUS DISSEMINATION
• Malicious software that attaches itself to
other software. (virus, worms, Trojan
Horse, web jacking, e-mail bombing etc.)
14. Types of Cyber Vandalism
Worms- usually spread through e-mails, attaches itself and resends itself
out through your e-mail contacts. Causes files to react slowly, and works its
way through individual and network computers.
Viruses- usually spread through innocent looking links and social network
sites attaching itself to applications, videos, and hyperlinks. Very harmful to
computers, causes hard drive failure, or can contain backdoor Trojan
programs which can contain key-loggers, remote access programs, open
pornography sites on its own, and access to total control over computer.
Computer Hacking – perpetrators break into security systems in order to
use services, change information, or steal information
15. CYBER TERRORISM
• Use of Internet based attacks in terrorist activities.
• Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
16. Technology Crimes
• Technology used in crime commission other than
computers themselves- includes software
• These crimes often affect the elderly through
phone scams promising large cash prizes after
giving up personal information such as bank
account numbers, or social security numbers.
17. Types of Technology Crimes
Cell Phone Fraud- fraudulently or legitimately
obtained cell phones used for deceptive purposes
such as promises of fake charities or prizes
designed to illicit personal information and money
from people
Software Piracy- illegal downloads of software
from the internet
18. Types of Technology Crimes
Shoplifting Software
Physically stealing hardware for resale or
information
Theft of cable services
19. Cyber Theft
• Use of the internet in the distribution of unlawful
materials for profit or to commit fraud for swift
revenue returns
• These crimes promote child pornography, and
perpetrators swindle millions of dollars a year
from innocent people while remaining
anonymous.
20. Types of cyber theft
Computer Fraud- includes theft of information,
software, manipulation of bank and credit card
accounts, and corporate espionage
Unlawful distribution of pornography or drugs for profit
Illegal Copyright Infringement (Warez) – stealing
software, destroying it’s copyright information, then
posting on internet or file sharing
Internet securities fraud
Identity Theft- computer used to steal personal
information to obtain fraudulent loans, credit, or bank
account information
21. Cyber Warfare
• Cyber crime in which perpetrators have political
motives attached.
• These crimes may involve computer network
penetrations on military bases, defense
contractors, and aerospace companies. The goal
is to embezzle vital data and information.
22. Types of Cyber Warfare
Cyber Terrorism- enemies strike at targets without
bombs, such as the American economy, or use
the internet to gather information on future targets
without having to go behind enemy lines.
Cyber Warfare- use of hackers to infiltrate
important systems such as the pentagon, the
National Security Agency, and nuclear weapons
lab.
Can also be used to attack electric power and
essential services
23. TYPES OF CYBER ATTACK BY PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
24. Recent Day Cyber Crime
The majority of cybercrimes are centered on forgery,
fraud and Phishing,
India is the third-most targeted country for Phishing
attacks after the US and the UK,
Social networks as well as ecommerce sites are major
targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during
2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating
spam.
25. Recent Day Cyber Crime
• Looking at the scam history, some of the popular scams have
been the ‘419 scam’,
• ‘See who viewed your profile!’,
• ‘Dad walks in on daughter …. Embarrassing!’,
• ‘The ‘dislike’ button’,
• ‘Make thousands working from home!’,
• Twitter direct messages with bad links,
• ‘Twitter mentions’,
• ‘Justin Bieber stabbed!’,
• ‘Your account has been cancelled.’,
• ‘Confirm your email account’,
• ‘Facebook will start charging members!’, and the list can go
on and on.
26. SAFETY TIPS FOR CYBER CRIME
• Use antivirus software’s.
• Insert firewalls.
• Uninstall unnecessary software
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
• Never give your full name or address to strangers.
• Learn more about Internet privacy.
• Don’t open emails or attachments from unknown
sources.
• Disable Remote Connectivity.
5P mantra for
online
security
Precaution
Prevention
Protection
Preservation
Perseverance
27. Security
The growing phenomenon of cybercrime is
causing a whole new set of laws and law
enforcement processes.
This causes numerous challenges for law
enforcement, because technology changes
so rapidly it is hard to keep up with the
training
28. CYBER SECURITY
• Internet security is a branch of computer security
specifically related to the Internet.
• It's objective is to establish rules and measure to
use against attacks over the Internet.
29. Application/Web
Logging DB (ms sql)
Web Console
(DB/Processing)
Agents
(Workstations/Laptops
/Servers )
Private Site Server
Private Site Server
Network Shares
(Non agent data
sources)
Public Site Server
SilentRunner
Nodes with
Proxy Agent
Computer Emergency Response Team
(CERT ) – Architecture(CERT ) – Architecture
30. ADVANTAGES OF CYBER
SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and
outgoing data on our computer.