170 likes | 206 Views
Cyber Crimes & Prevention Strategies. Venkatachalapathy ACP, BFIW, Chennai. CYBER CRIME. Crime - An act of commission or omission which is punishable under the law in force. Cyber Crime - The act of using a computer to commit an illegal act.
E N D
Cyber Crimes & Prevention Strategies Venkatachalapathy ACP, BFIW, Chennai.
CYBER CRIME • Crime - An act of commission or omission which is punishable under the law in force. • Cyber Crime - The act of using a computer to commit an illegal act. • The word ‘Cyber’ was first coined by William Gibson in his novel ‘Neuromancer’ in the year 1984.
INCLINATION TOWARDS CYBER CRIME • Internet connectivity through development of smart phones • Physical presence not required • Transnational in operation • Lack of user awareness • Anonymity
: COMMON TARGETS OF COMPUTER CRIMINALS • Corporate Houses (targeted by competitors to know trade secrets) • Banks and other financial institutions (targeted by professionals, white-collar criminals / swindlers.) • Commercial, Industrial or Trading companies (targeted by employees owing to frustration, animosity etc.) • Government organization or Service Industries (targeted by terrorists) • Military and Intelligence Organizations (targeted by hostile agents) • Universities, Scientific Organizations, Research Institutions (target of students)
Types of Crime • Steganography- writing hidden messages in files • Virus-replicate into other program. • Worm- malicious software to disrupt operation- to spread itself. • Logic Bomb- code inserted in the system that set off a malicious function on specific condition • Trojan Horse- hacking program gains privileged access. • Cyber Stalking- harassment. • Hacking-un authorized access • Password Cracking-break or burst password • Spoofing- making alike • DoS /Denial of Service-render useless • Sniffing- smelling or decoding the concealed • Pornography- obscene • Cyber Defamation -defaming • Cookies –small piece of data in website-to track browsing history
On-line Fraud – M.O • Phishing (User Awareness) • Key-logger (Use virtual key board) • Trojan (Anti-virus / Fire Wall) • Lottery Scam (Do not be greedy) • Job Racket (Verify the credibility)
Internet scams “The Nigerian Scam” You receive an unsolicited email / SMS informing that you have won a lottery or bequeathed of huge wealth that requires you to pay an upfront fee. • Inviting for attending an international seminar – asking for reservation charges for stay and travel. • Alluring a share in the inherited property in a nation undergoing chaos in return for its safe custody in a bank account. • Promising lucrative jobs or admission in an elite educational institution. • Allurement by Lottery prize money or valuable
Internet scams Spoofing and phishing: • Criminals create or spoof the webpage of a bank and send a mail asking for password and confidential information in the guise of enhancing the security. • Funds are transferred to bogus fictitious accounts within the country followed by a quick withdrawal concealing the identity. Solutions: • Internet banking only to those who need. • Verifying the request for fund transfer from a foreign country.
Child exploitation- Prevention • It is always the parents who have to keep a watch on the sites that your children are accessing, to prevent any kind of harassment or depravation in children. • One should avoid disclosing any personal information to strangers via e-mail or while chatting. • One must avoid sending any photograph to strangers by online
Information Technology ACT • Sec : 66. Hacking • Sec : 66 A. Sending offensive message • Sec : 66 B. Receiving Stolen Computer Resources • Sec : 66 C. Identity theft • Sec : 66 D. Impersonation • Sec : 66 E. Capturing private area • Sec : 66 F. Terrorism
I.T . ACT Contd… • Sec : 67 A. Pornography • Sec : 67 B. Child Pornography
Credit/Debit Card Fraud M.O. • Stealing Data from POS Terminal/ ATM • Interception of Cards • Downloading data Online • Electronic Pick-Pocket
preventive tips • Keep your computer, virus protected • Do not access unwanted/unsecured web sites • Do not answer the web pages opened automatically/ with out any purpose • Do not use your credit/debit cards in net cafes • Do not response the SMS that is not related to you • Do not share information of PIN number/ code/ date of birth • Do not give cell numbers to unknown people • Beware of VOIP calls • Do not log in unwanted sites.
Prevention Strategies • Memorize your pin number/ Do not write • Change password often • Use complex passwords • Never give credit card information to unsolicited caller • Tear up or shred credit card receipts • Obtain credit card report regularly to check for fraudulent accounts • Report lost credit cards immediately • Take time to carefully review your bank and credit card statements and other bills.
Cell Phone & Computer Hazardous • Even deleted video/ audio/ Files/matter s can be retrieved with out your knowledge at centers. • Do not chat with unknown people. • Use FB/ other social net works reasonably. • SMS may carry different meaning between youngsters. • Web camera has its disadvantages too. • Do not keep the Wi-Fi turned on.