1 / 16

Cyber Crimes & Prevention Strategies

Cyber Crimes & Prevention Strategies. Venkatachalapathy ACP, BFIW, Chennai. CYBER CRIME. Crime - An act of commission or omission which is punishable under the law in force. Cyber Crime - The act of using a computer to commit an illegal act.

Download Presentation

Cyber Crimes & Prevention Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Crimes & Prevention Strategies Venkatachalapathy ACP, BFIW, Chennai.

  2. CYBER CRIME • Crime - An act of commission or omission which is punishable under the law in force. • Cyber Crime - The act of using a computer to commit an illegal act. • The word ‘Cyber’ was first coined by William Gibson in his novel ‘Neuromancer’ in the year 1984.

  3. INCLINATION TOWARDS CYBER CRIME • Internet connectivity through development of smart phones • Physical presence not required • Transnational in operation • Lack of user awareness • Anonymity

  4. : COMMON TARGETS OF COMPUTER CRIMINALS • Corporate Houses (targeted by competitors to know trade secrets) • Banks and other financial institutions (targeted by professionals, white-collar criminals / swindlers.) • Commercial, Industrial or Trading companies (targeted by employees owing to frustration, animosity etc.) • Government organization or Service Industries (targeted by terrorists) • Military and Intelligence Organizations (targeted by hostile agents) • Universities, Scientific Organizations, Research Institutions (target of students)

  5. Types of Crime • Steganography- writing hidden messages in files • Virus-replicate into other program. • Worm- malicious software to disrupt operation- to spread itself. • Logic Bomb- code inserted in the system that set off a malicious function on specific condition • Trojan Horse- hacking program gains privileged access. • Cyber Stalking- harassment. • Hacking-un authorized access • Password Cracking-break or burst password • Spoofing- making alike • DoS /Denial of Service-render useless • Sniffing- smelling or decoding the concealed • Pornography- obscene • Cyber Defamation -defaming • Cookies –small piece of data in website-to track browsing history

  6. On-line Fraud – M.O • Phishing (User Awareness) • Key-logger (Use virtual key board) • Trojan (Anti-virus / Fire Wall) • Lottery Scam (Do not be greedy) • Job Racket (Verify the credibility)

  7. Internet scams “The Nigerian Scam” You receive an unsolicited email / SMS informing that you have won a lottery or bequeathed of huge wealth that requires you to pay an upfront fee. • Inviting for attending an international seminar – asking for reservation charges for stay and travel. • Alluring a share in the inherited property in a nation undergoing chaos in return for its safe custody in a bank account. • Promising lucrative jobs or admission in an elite educational institution. • Allurement by Lottery prize money or valuable

  8. Internet scams Spoofing and phishing: • Criminals create or spoof the webpage of a bank and send a mail asking for password and confidential information in the guise of enhancing the security. • Funds are transferred to bogus fictitious accounts within the country followed by a quick withdrawal concealing the identity. Solutions: • Internet banking only to those who need. • Verifying the request for fund transfer from a foreign country.

  9. Child exploitation- Prevention • It is always the parents who have to keep a watch on the sites that your children are accessing, to prevent any kind of harassment or depravation in children. • One should avoid disclosing any personal information to strangers via e-mail or while chatting. • One must avoid sending any photograph to strangers by online

  10. Information Technology ACT • Sec : 66. Hacking • Sec : 66 A. Sending offensive message • Sec : 66 B. Receiving Stolen Computer Resources • Sec : 66 C. Identity theft • Sec : 66 D. Impersonation • Sec : 66 E. Capturing private area • Sec : 66 F. Terrorism

  11. I.T . ACT Contd… • Sec : 67 A. Pornography • Sec : 67 B. Child Pornography

  12. Credit/Debit Card Fraud M.O. • Stealing Data from POS Terminal/ ATM • Interception of Cards • Downloading data Online • Electronic Pick-Pocket

  13. preventive tips • Keep your computer, virus protected • Do not access unwanted/unsecured web sites • Do not answer the web pages opened automatically/ with out any purpose • Do not use your credit/debit cards in net cafes • Do not response the SMS that is not related to you • Do not share information of PIN number/ code/ date of birth • Do not give cell numbers to unknown people • Beware of VOIP calls • Do not log in unwanted sites.

  14. Prevention Strategies • Memorize your pin number/ Do not write • Change password often • Use complex passwords • Never give credit card information to unsolicited caller • Tear up or shred credit card receipts • Obtain credit card report regularly to check for fraudulent accounts • Report lost credit cards immediately • Take time to carefully review your bank and credit card statements and other bills.

  15. Cell Phone & Computer Hazardous • Even deleted video/ audio/ Files/matter s can be retrieved with out your knowledge at centers. • Do not chat with unknown people. • Use FB/ other social net works reasonably. • SMS may carry different meaning between youngsters. • Web camera has its disadvantages too. • Do not keep the Wi-Fi turned on.

More Related