CYBER CRIME
“ComExs”…
16 July 2013
CONFIDENTIAL
1
1988 THE BEGINNING!
10%
16 July 2013
CONFIDENTIAL
2
CYBER CRIME OVERVIEW
16 July 2013
CONFIDENTIAL
3
TYPES OF CYBER CRIME
16 July 2013
CONFIDENTIAL
4
HACKING
SOFTWARE PIRACY 16 July 2013
CONFIDENTIAL
5
EMAIL BOMBING 16 July 2013
WEB JACKING
CONFIDENTIAL
6
DATA DIDDLING
16 July 2013
CONFIDENTIAL
VIRUS ATTACKS 7
U MAY BE A VICTIM
© VIRUSES N MALWARE - LOOKING BEYOND THE FACADE. -AUTO VIGILANCE WITH ANTI VIRUS. © DENIAL OF SERVICE ATTACKS © HACKING -KEEP YOUR FRIENDS CLOSE, BUT YOUR ENEMIES CLOSER. ©ONLINE PRESENCE -FACEBOOK IS NOT ALL RAINBOWS N BUTTERFLIES ©PHISHING 16 July 2013
CONFIDENTIAL
9
16 July 2013
CONFIDENTIAL
10
PROCESS OF COMMITTING 1: IDENTIFYING THE VICTIM 2: INFORMATION GATHERING
3: FINDING THE LOOPHOLES 4: BREAK IN 5: ESCAPE WITHOUT A TRACE 16 July 2013
CONFIDENTIAL
11
WHO ARE THEY? CHILDREN & ADOLESCENTS, AGE: 6-18. ORGANIZED HACKERS. PROFESSIONAL HACKERS/CRACKERS. DISCONTENTED EMPOLYEES. 16 July 2013
CONFIDENTIAL
12
INDIAN CYBERCRIME LAWS IT ACT, 2000 AND IT (AMENDMENT) ACT, 2008 OFFENCES COVERED UNDER THIS ACT:ØHACKING ØDATA THEFT
ØIDENTITY THEFT ØEMAIL SPOOFING ØSENDING OFFENSIVE MESSAGE
ØVAYEURISM ØCYBER TERRORISM
16 July 2013
CONFIDENTIAL
13
CYBER TERRORISM
16 July 2013
CONFIDENTIAL
14
BLUE BOX
16 July 2013
CONFIDENTIAL
15
WHAT WILL YOU DO!!! MESSAGE BOX MATRIX CODE
16 July 2013
CONFIDENTIAL
16
GENERAL PREVENTION № PREVENT CREDIT/DEBIT CARD FRAUDES. № TAKE A TEST BEFORE OPENING AN E-MAIL ATTACHMENT. № SECURE YOUR COMPUTER. № PROTECT YOUR WEBSITE. № USE STRONG PASSWORD.
16 July 2013
CONFIDENTIAL
17
CAUTION!!! €DON’T RESPOND TO INAPPROPRIATE MESSAGES OR E-MAILS. €DON’T POST INAPPROPIATE CONTENT. €BE LEERY OR PERSONAL QUESTIONS FRON STRANGERS. €DON’T BE BULLIED INTO FIGHTS. €DON’T USE ADULT SITES. €UNDERSTAND WHAT YOU PUT ONLINE WILL BE THERE FOREVER… 16 July 2013
CONFIDENTIAL
18
VT TO CYBER CRIME
US CYBER CHALLENGE!!!
16 July 2013
CONFIDENTIAL
19
CREDITS: CREATED BY:
RAGHAV RAJ
PRESENTED BY: GUIDED BY:
RAGHAV, JITESH, VIBHOR MAM SHABANA
INSPIRED BY:
KEVIN MITTNIK
DEDICATED TO:
COMPUTER LOVERS
16 July 2013
CONFIDENTIAL
20