cyber crime & security

Post on 13-Jan-2017

90 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Copyright of Thinking Hut IT Solutions Pvt Ltd

Cyber Crime & SecurityA Primer

Uday Bhaskarwarthinkinghut@thinkinghut.com

Copyright of Thinking Hut IT Solutions Pvt Ltd

The fight between Good and Bad

will always be ON

Copyright of Thinking Hut IT Solutions Pvt Ltd

Copyright of Thinking Hut IT Solutions Pvt Ltd4

What is Cyber Crime?

Computer as a Weapon Computer as a Target

A Crime that involves a Computer

Copyright of Thinking Hut IT Solutions Pvt Ltd

First Cyber Crime ~200

years back!!

• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. It allowed the automation in the weaving of fabrics. His employees felt that their traditional employment was being threatened. They sabotaged the machine to discourage Jacquard.

The first spam in 1978

• The first spam email took place in 1978 when it was sent out over the Arpanet

The first virus in 1982

• The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk Cloner

How old is Cyber Crime?

Copyright of Thinking Hut IT Solutions Pvt Ltd6

How Big is Cyber Crime?

Computer as a Target

Copyright of Thinking Hut IT Solutions Pvt Ltd7

How Big is Cyber Crime?

Computer as a Target

Copyright of Thinking Hut IT Solutions Pvt Ltd

How Big is Cyber Crime?

Copyright of Thinking Hut IT Solutions Pvt Ltd9

Where do we stand?

Computer as a Target

Copyright of Thinking Hut IT Solutions Pvt Ltd

Cyber Crime is here to stay

You better get ready!

Copyright of Thinking Hut IT Solutions Pvt Ltd11

Levels at which Cyber Crime is committed

Person

Organization

Nation

Copyright of Thinking Hut IT Solutions Pvt Ltd12

It’s just like any other crime…

Cyber Criminals Use Tools

& Technique

s

To commit Cyber Crimes

Copyright of Thinking Hut IT Solutions Pvt Ltd

Tools - Malicious Software or Malware

13

Ransomware

Copyright of Thinking Hut IT Solutions Pvt Ltd

Types of Cyber Crimes

14

Web Jacking

Copyright of Thinking Hut IT Solutions Pvt Ltd

Types of Cyber Crimes

15

Salami Slicing Computer Vandalism

Cyber Stalking

Data Diddling

Copyright of Thinking Hut IT Solutions Pvt Ltd

Types of Cyber Crimes

16

Spamming Cyber Trafficking

Child Solicitation

Copyright of Thinking Hut IT Solutions Pvt Ltd

Technique - Phishing

17

Copyright of Thinking Hut IT Solutions Pvt Ltd

Technique - Vishing

18

Copyright of Thinking Hut IT Solutions Pvt Ltd

Technique - Smishing

19

Copyright of Thinking Hut IT Solutions Pvt Ltd

Security Threats in Mobiles

20

Vulnerable

Browser Exploits

WiFi Sniffing

Copyright of Thinking Hut IT Solutions Pvt Ltd

Some interesting Cyber Crimes / Criminals

21

Copyright of Thinking Hut IT Solutions Pvt Ltd

Why is it difficult to detect & crack Cyber Crime?

22

Can be executed remotely

International – difficult for law enforcement

Difficult to defend

Copyright of Thinking Hut IT Solutions Pvt Ltd

How worried should I be?

23

As worried as you are for other type of crimes…

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DOs

24

Long Random String

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DOs

25

Delete Unnecessary Software

Type URLs directly into the address bar

Regularly check financial

transactions

Register your e-mail and mobile number

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DON’Ts

26

Do not visit unknown websites

Refrain from clicking links

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DON’Ts

27

• Never reply to emails that seek personal information.• Never respond to offers of money from abroad.• Never respond to/ make remittances/ participate in schemes or

offers from unknown entities.• Never reply to emails or SMS' claiming  that the recipient has won a

substantial sum of money in an online lottery or promotion.• Never fill out forms in email messages that ask for personal financial

information.• Never click or forward links in an email, instant message, or chat

from unknown senders or if you suspect the authenticity of the message.

• Never share confidential details like Card number, expiry date, CVV, OTP, Password with anyone when you receive any unsolicited calls, SMS, IVR or email.

Copyright of Thinking Hut IT Solutions Pvt Ltd

Remember…

Copyright of Thinking Hut IT Solutions Pvt Ltd

The conventional wars will soon be a passé…

The new-age wars will be fought in the Cyber world!

Final Thoughts…

Copyright of Thinking Hut IT Solutions Pvt Ltd

Copyright of Thinking Hut IT Solutions Pvt Ltd

top related