cyber crime & security

32
Copyright of Thinking Hut IT Solutions Pv Cyber Crime & Security A Primer Uday Bhaskarwar [email protected]

Upload: uday-bhaskarwar

Post on 13-Jan-2017

90 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Cyber Crime & SecurityA Primer

Uday [email protected]

Page 2: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

The fight between Good and Bad

will always be ON

Page 3: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Page 4: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd4

What is Cyber Crime?

Computer as a Weapon Computer as a Target

A Crime that involves a Computer

Page 5: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

First Cyber Crime ~200

years back!!

• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. It allowed the automation in the weaving of fabrics. His employees felt that their traditional employment was being threatened. They sabotaged the machine to discourage Jacquard.

The first spam in 1978

• The first spam email took place in 1978 when it was sent out over the Arpanet

The first virus in 1982

• The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk Cloner

How old is Cyber Crime?

Page 6: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd6

How Big is Cyber Crime?

Computer as a Target

Page 7: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd7

How Big is Cyber Crime?

Computer as a Target

Page 8: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

How Big is Cyber Crime?

Page 9: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd9

Where do we stand?

Computer as a Target

Page 10: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Cyber Crime is here to stay

You better get ready!

Page 11: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd11

Levels at which Cyber Crime is committed

Person

Organization

Nation

Page 12: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd12

It’s just like any other crime…

Cyber Criminals Use Tools

& Technique

s

To commit Cyber Crimes

Page 13: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Tools - Malicious Software or Malware

13

Ransomware

Page 14: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Types of Cyber Crimes

14

Web Jacking

Page 15: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Types of Cyber Crimes

15

Salami Slicing Computer Vandalism

Cyber Stalking

Data Diddling

Page 16: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Types of Cyber Crimes

16

Spamming Cyber Trafficking

Child Solicitation

Page 17: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Technique - Phishing

17

Page 18: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Technique - Vishing

18

Page 19: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Technique - Smishing

19

Page 20: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Security Threats in Mobiles

20

Vulnerable

Browser Exploits

WiFi Sniffing

Page 21: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Some interesting Cyber Crimes / Criminals

21

Page 22: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Why is it difficult to detect & crack Cyber Crime?

22

Can be executed remotely

International – difficult for law enforcement

Difficult to defend

Page 23: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

How worried should I be?

23

As worried as you are for other type of crimes…

Page 24: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DOs

24

Long Random String

Page 25: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DOs

25

Delete Unnecessary Software

Type URLs directly into the address bar

Regularly check financial

transactions

Register your e-mail and mobile number

Page 26: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DON’Ts

26

Do not visit unknown websites

Refrain from clicking links

Page 27: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

How to Protect Yourself? – DON’Ts

27

• Never reply to emails that seek personal information.• Never respond to offers of money from abroad.• Never respond to/ make remittances/ participate in schemes or

offers from unknown entities.• Never reply to emails or SMS' claiming  that the recipient has won a

substantial sum of money in an online lottery or promotion.• Never fill out forms in email messages that ask for personal financial

information.• Never click or forward links in an email, instant message, or chat

from unknown senders or if you suspect the authenticity of the message.

• Never share confidential details like Card number, expiry date, CVV, OTP, Password with anyone when you receive any unsolicited calls, SMS, IVR or email.

Page 28: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Remember…

Page 29: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

The conventional wars will soon be a passé…

The new-age wars will be fought in the Cyber world!

Final Thoughts…

Page 30: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd

Page 31: Cyber Crime & Security

Copyright of Thinking Hut IT Solutions Pvt Ltd