1. CYBER CRIME AND SECURITY
Name : MD NISHAD
Enrolment No : 12017001010006
MBA 1st Year, 2nd Semester
University of Engineering & Management,
Kolkata
2. What is cyber crime?
History of cyber crime
Types of cyber crime
Cyber crime in India statistics
Who are cyber criminals?
Types of hackers
Why computers vulnerable?
WannaCry Ransomware
Ways to protect yourself from cyber crime
Conclusion
3. WHAT IS CYBER
CRIME?
Cyber crime, or computer oriented crime, is a crime that involves a computer and a network. The computer
may have been used in the commission of a crime, or it may be the target. Cyber crime can be defined as:
"Offences that are committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly
or indirectly, using modern telecommunication networks such as Internet (networks including but not limited
to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
4. HISTORY OF CYBE
The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that
the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in
India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles
Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device
allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst
Jacquard's employees that their traditional employment and livelihood were being threatened. They
committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first
recorded cyber crime!
5. TYPES OF
CYBER CRIMEFinancial Crimes
Sale of Illegal Articles
Distributed Denial of Service Attack (DDoS)
Email Spoofing
Forgery
Hacking
6. FINANCIAL
CRIME
This would include cheating, credit card frauds, money laundering etc. To cite a recent case, a website offered to
sell Alphonso mangoes at a throwaway price. Distrusting such a transaction, very few people responded to or
supplied the website with their credit card numbers. These people were actually sent the Alphonso mangoes. The
word about this website now spread like wildfire. Thousands of people from all over the country responded and
ordered mangoes by providing their credit card numbers. The owners of what was later proven to be a bogus
website then fled taking the numerous credit card numbers and proceeded to spend huge amounts of money much
to the chagrin of the card owners.
7. This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, auction
websites, and bulletin boards or simply by using email communication.
8. EMAIL
SPOOFING
A spoofed email is one that appears to originate from one source
but actually has been sent from another source. E.g. angel has an
e-mail address angel@angelspeaks.com. His enemy, Rex spoofs
his e-mail and sends obscene messages to all her acquaintances.
Since the e-mails appear to have originated from Angel, his
friends and business partners could take offence and relationships
could be spoiled for life.
Email spoofing can also cause monetary damage. In an American
case, a teenager made millions of dollars by spreading false
information about certain companies whose shares he had short
sold. This misinformation was spread by sending spoofed emails,
purportedly from news agencies like Reuters, to share brokers and
investors who were informed that the companies were doing very
badly. Even after the truth came out the values of the shares did
SPOOFIN
G
9. FORGERY
Counterfeit currency notes, postage and
revenue stamps, mark sheets etc can be
forged using sophisticated computers,
printers and scanners. These are made
using computers, and high quality
scanners and printers. In fact, this has
become a booming business involving
thousands of Pula being given to student
gangs in exchange for these bogus but
authentic looking certificates.
10. In simple words, hacking is an act committed by an intruder by
accessing your computer system without your permission. Hackers
(the people doing the ‘hacking’) are basically computer
programmers, who have an advanced understanding of computers
and commonly misuse this knowledge for devious reasons. They’re
usually technology buffs who have expert-level skills in one
particular software program or language. As for motives, there
could be several, but the most common are pretty simple and can
be explained by a human tendency such as greed, fame, power, etc.
Some people do it purely to show-off their expertise – ranging
from relatively harmless activities such as modifying software (and
even hardware) to carry out tasks that are outside the creator’s
intent, others just want to cause destruction.
11. A DDoS attack focuses on disrupting the service to a
network. Attackers send high volumes of data or
traffic through the network (i.e. making lots of
connection requests), until the network becomes
overloaded and can no longer function.
This involves the attacker using multiple computers
to send the traffic or data that will overload the
system. In many instances, a person may not even
realize that his or her computer has been hijacked
and is contributing to the DDoS attack.
The best way to prevent an additional breach is to
keep your system as secure as possible with regular
software updates, online security monitoring and
monitoring your data flow to identify any unusual or
threatening spikes in traffic before they become a
problem. DoS attacks can also be perpetrated by
simply cutting a cable or dislodging a plug that
connects your website’s server to the internet, so due
diligence in physically monitoring your connections
is recommended as well.
15. Computers, despite being such high technology devices, are
extremely vulnerable. In fact it may be easier to steal
national secrets from military computers than to steal
"laddoos" from a "mithai" shop. Let us examine the
reasons for the vulnerability of computers.
Computers store huge amounts of data in small
Ease of access
Complexity
Human error
16.
17.
18. The WannaCry ransomware attack was a May 2017
worldwide cyberattack by the WannaCry ransomware
cryptoworm, which targeted computers running the
Microsoft Windows operating system by encrypting data
and demanding ransom payments in the Bitcoin crypto
currency.
The attack began on Friday, 12 May 2017, with evidence
pointing to an initial infection in Asia at 7:44am UTC.
The initial infection was likely through an exposed
vulnerable SMB port, rather than email phishing as
initially assumed. Within a day the code was reported to
have infected more than 230,000 computers in over 150
countries.
Linguistic analysis of the ransom notes indicated the
authors were likely fluent in Chinese and proficient in
English, as the versions of the notes in those languages
probably human-written while the rest seemed to be
machine-translated.
Organizations that had not installed Microsoft's
security update from April 2017 were affected by the
Experts quickly advised affected users against paying the
ransom due to no reports of people getting their data back
after payment and as high revenues would encourage more
19.
20.
21. Encrypt your data (Important) .
Reduce transfer of data .
Protect your e-identity, look for https://
Do NOT store your card details on websites .
Got hacked??Call the right person/ lawyer /
LEA (Law Enforcement Agency) for help.
Never Trust E-mails.
Do not share a code received accidentally via 2 step
verification!
Review your credit card statements.
Crosscheck your Social-Media security settings.
Instead of ‘Passwords’, Use ‘Passphrases’ for
Different websites.
Secure your computer/laptop physically and by:
i. Activating your firewall.
ii. Using Anti-Virus/Anti-Malware software.
Never upload your personal data ‘unencrypted’ to
drop box, google drive or any online file sharing
services. (Use Bitlocker)
Restrict download.
Do not procrastinate update installations (even the
“installing 127 of 1204” ones) !
Wi-Fi-The most vulnerable network Ever!!
22.
23.
24. I would like to express my deepest appreciation to all those who have been a support
to me in completing this project. A special gratitude I would want to give to my ACS
(Mrs.Puja Guin) for her outstanding guidance, suggestions and all the assist in
carrying this out, nevertheless for which this project would not have been
accomplished.
I also want to thank my MD (Mr.Pinaki Prasad Roy) for his constant help and
support.