SlideShare a Scribd company logo
1 of 23
Download to read offline
Presentation by : Priyanka Tomar
priyanka@newerasystem.com
Objective
 Provide a brief idea of cyber/computer attacks and
preventive measure to be adopted with reference to
Law Enforcement Agencies.
PREREQUISITES
 Computer Hardware
 Computer Software
 Internet Surfing
 Email
 Networking
 IP Address
Combating Cyber Crime
 Cyber + Security
 What is Security
 What is Cyber Security
 involves detection, prevention and responding to attacks
 Why do we need Cyber Security –Phishing, Credit Card Frauds
Combating Cyber Crime
 Who is Vulnerable –e.g. screen hack
Cyber Security Threats
 Virus
 Worm
 Trojan Horse
 Remote Administration Tool – Prorat, Poison Ivy
Cyber Security Threats-RAT
The operator controls the RAT through a network connection. RAT
provide an operator the following capabilities:
 Screen/camera control.
 File management (download/upload/execute etc.
 Shell control (from command prompt).
 Computer control (power off/on/log off).
 Registry management (query/add/delete/modify).
 Start, stop and restart Windows services.
 Copy/delete files and format disks.
 View and clear the windows event logs.
 Other software product-specific functions.
Cyber Security Threats
 Hackers
 Identity Thieves
 Spyware/Adware
 Website advertisements
Consequences of Inaction
 Loss of access
 Loss of confidentiality, integrity and public trust
 Lawsuits, Disciplinary action
The US has charged six members of an international
cybercrime gang that hacked into user accounts to defraud
eBay's Stubhub ticket reselling website of about $1m.
The men were arrested in the UK, Canada and Spain in
connection with the scam in which more than 1,600
StubHub users had their credit cards used to buy tickets,
which were then sold on by the criminals.
Preventive Measures -I
 OS/Software Updates
 Anti virus
 Personal Firewalls
 Check Open Ports -http://www.auditmypc.com/firewall-test.asp
How to block Ports
 Block Ports
 Control Panel>System and Security> Windows Firewall
 Advanced Settings
 See inbound and outbound rules
 Create your own rule
How to know if there is spyware?
 Endless pop-up windows.
 Redirected to other websites automatically.
 Random Windows error messages .
 Computer suddenly seems slow.
 New and unexpected toolbars appear in web browser.
 New and unexpected icons appear in the task tray.
 Browser's home page suddenly changed.
 Search engine your browser opens has been changed.
 Don't click on links within pop-up windows
 Be careful while installing free software , never forget
to read user agreement.
 Block pop-up windows and cookies by adjusting
browser preferences.
 Be aware of unexpected dialog boxes asking -Do you
want to run a xxxx program . Always select "no" or
"cancel," or close the dialog box.
Prevent Spyware Installation
Remove Spyware
 Spyware copies several files to different directories and
changes the registry. Use a spyware remover - a
program dedicated to removal of sypware.
 Run a legitimate product to remove spyware e.g
Ad-Aware, Microsoft Window Defender, Webroot's
SpySweeper etc.
Preventive Measures-II
 Prevent Identity Theft-Beware of phishing scams - a form of fraud that uses
email messages that appear to be from a reputable business (often a financial institution)
in an attempt to gain personal/ financial account information. These often do not
include a personal salutation. Never enter personal information into an online form you
accessed via a link in an email you were not expecting. Legitimate businesses will not ask
for personal information online.
 Intrusion Detection Software/Device
Phishing
Google Security Team to Sunitha
Verification Required.
Dear Gmail User,
The Gmail infrastructure is going through an annual security and performance overhaul. In the same respect, you
are requested to verify your account by clicking on the following link. The Google Security Team is available to
provide you all the assistance for secure communication over the Internet. Happy surfing!
accountverification.gmail.com/src/verify.php?confirmation=dhPGcsiuUNdnAoN77q5CHwCgl4MmCAXE
72d
You are requested to act on this immediately to guarantee the smooth functioning of your mail account.
Thanks,
Account Security Administrator
Google Security Team
Google, Inc. Phone: +1 650-253-0000
You are receiving this message from Google because you are a valued member. Google respects your privacy. To
learn more, please read our online Privacy Statement. For more information or for general questions regarding
your e-mail account, please visit Gmail Help.
Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043. All rights reserved.
Preventive Measures
 Protect Passwords
 Regular Backup
Preventive Measures -II
 Setup Cyber Security Policies
 Email Virus Filtering Services
 Firewall Services
 Email attachment Filtering
 Vulnerability Scanning
 Intrusion Prevention System
By: Priyanka Tomar
priyanka@newerasystem.com

More Related Content

What's hot

Get Rid Of Windows Safety Checkpoint - Guideline to Automatic Removal
Get Rid Of Windows Safety Checkpoint - Guideline to Automatic  RemovalGet Rid Of Windows Safety Checkpoint - Guideline to Automatic  Removal
Get Rid Of Windows Safety Checkpoint - Guideline to Automatic Removalcostamary
 
Uninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guideUninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guidecoseanonans
 
Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modemmangal das
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computerharoNaroum
 
Steps to disable strong signal ads
Steps to disable strong signal adsSteps to disable strong signal ads
Steps to disable strong signal adshuasom
 
Remove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your SystemRemove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your Systemcostamary
 
Remove Hotmail Hacker - Guideline For Automatic Removal
Remove Hotmail Hacker - Guideline For Automatic RemovalRemove Hotmail Hacker - Guideline For Automatic Removal
Remove Hotmail Hacker - Guideline For Automatic Removalcostamary
 
Steps to disable strong signal ads
Steps to disable strong signal adsSteps to disable strong signal ads
Steps to disable strong signal adshuasom
 
Remove Windows Safety ManagerIn Few Simple Automatic Steps
Remove Windows Safety ManagerIn Few Simple Automatic StepsRemove Windows Safety ManagerIn Few Simple Automatic Steps
Remove Windows Safety ManagerIn Few Simple Automatic Stepscostamary
 
Eliminate Adsxn.com
Eliminate Adsxn.comEliminate Adsxn.com
Eliminate Adsxn.comgoergehill
 
How to remove trending upnow pop up
How to remove trending upnow pop upHow to remove trending upnow pop up
How to remove trending upnow pop upharoNaroum
 
5 Steps to Manage a Data Breach
5 Steps to Manage a Data Breach5 Steps to Manage a Data Breach
5 Steps to Manage a Data BreachSecurityMetrics
 

What's hot (19)

Get Rid Of Windows Safety Checkpoint - Guideline to Automatic Removal
Get Rid Of Windows Safety Checkpoint - Guideline to Automatic  RemovalGet Rid Of Windows Safety Checkpoint - Guideline to Automatic  Removal
Get Rid Of Windows Safety Checkpoint - Guideline to Automatic Removal
 
Uninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guideUninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guide
 
Huawei Wa1003a
Huawei Wa1003aHuawei Wa1003a
Huawei Wa1003a
 
Secure wireless modem
Secure wireless modemSecure wireless modem
Secure wireless modem
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computer
 
Steps to disable strong signal ads
Steps to disable strong signal adsSteps to disable strong signal ads
Steps to disable strong signal ads
 
Remove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your SystemRemove Windows Foolproof Protector Automatically From Your System
Remove Windows Foolproof Protector Automatically From Your System
 
Remove Hotmail Hacker - Guideline For Automatic Removal
Remove Hotmail Hacker - Guideline For Automatic RemovalRemove Hotmail Hacker - Guideline For Automatic Removal
Remove Hotmail Hacker - Guideline For Automatic Removal
 
Remove efishedo.info from Windows PCs
Remove efishedo.info from Windows PCsRemove efishedo.info from Windows PCs
Remove efishedo.info from Windows PCs
 
Steps to disable strong signal ads
Steps to disable strong signal adsSteps to disable strong signal ads
Steps to disable strong signal ads
 
Remove Savuerone
Remove SavueroneRemove Savuerone
Remove Savuerone
 
Dosearches
DosearchesDosearches
Dosearches
 
Remove Windows Safety ManagerIn Few Simple Automatic Steps
Remove Windows Safety ManagerIn Few Simple Automatic StepsRemove Windows Safety ManagerIn Few Simple Automatic Steps
Remove Windows Safety ManagerIn Few Simple Automatic Steps
 
Protect your pc
Protect your pcProtect your pc
Protect your pc
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Eliminate Adsxn.com
Eliminate Adsxn.comEliminate Adsxn.com
Eliminate Adsxn.com
 
How to remove trending upnow pop up
How to remove trending upnow pop upHow to remove trending upnow pop up
How to remove trending upnow pop up
 
5 Steps to Manage a Data Breach
5 Steps to Manage a Data Breach5 Steps to Manage a Data Breach
5 Steps to Manage a Data Breach
 

Viewers also liked

(2014 관측회) 점상촬영법
(2014 관측회) 점상촬영법(2014 관측회) 점상촬영법
(2014 관측회) 점상촬영법soar7sci
 
νεο λυκειο
νεο λυκειονεο λυκειο
νεο λυκειοelpitheo
 
Public-Private Roundtables at the Fourth Clean Energy Ministerial
Public-Private Roundtables at the Fourth Clean Energy MinisterialPublic-Private Roundtables at the Fourth Clean Energy Ministerial
Public-Private Roundtables at the Fourth Clean Energy MinisterialValerie Riedel
 
The change.asia - results not reports
The change.asia  - results not reportsThe change.asia  - results not reports
The change.asia - results not reportspck100
 
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamOWASP Delhi
 
سمینار آشنائی Ims
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims Meisam J Moghadam
 
Better football
Better footballBetter football
Better footballJack740
 
Breakaway Service
Breakaway ServiceBreakaway Service
Breakaway Servicepck100
 
Visualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionVisualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionMhermano
 
Ống kính và cảm biến trong hệ thống CCTV
Ống kính và cảm biến trong hệ thống CCTVỐng kính và cảm biến trong hệ thống CCTV
Ống kính và cảm biến trong hệ thống CCTVPhuongVietCamera
 
CEREC 30
CEREC 30CEREC 30
CEREC 30Lalamay
 
Civic sports
Civic sportsCivic sports
Civic sportsJack740
 
謎コンテンツ制作者向けアンケート第1段:集計結果
謎コンテンツ制作者向けアンケート第1段:集計結果謎コンテンツ制作者向けアンケート第1段:集計結果
謎コンテンツ制作者向けアンケート第1段:集計結果Uran Bird
 
Antenille's Motivation Theories Presentation
Antenille's Motivation Theories PresentationAntenille's Motivation Theories Presentation
Antenille's Motivation Theories Presentationantenille
 
Creative education summit
Creative education summitCreative education summit
Creative education summitJack740
 
小中学生のスマートフォンの使用を禁止すべきか?
小中学生のスマートフォンの使用を禁止すべきか?小中学生のスマートフォンの使用を禁止すべきか?
小中学生のスマートフォンの使用を禁止すべきか?Yukika Sakai
 

Viewers also liked (19)

(2014 관측회) 점상촬영법
(2014 관측회) 점상촬영법(2014 관측회) 점상촬영법
(2014 관측회) 점상촬영법
 
νεο λυκειο
νεο λυκειονεο λυκειο
νεο λυκειο
 
Public-Private Roundtables at the Fourth Clean Energy Ministerial
Public-Private Roundtables at the Fourth Clean Energy MinisterialPublic-Private Roundtables at the Fourth Clean Energy Ministerial
Public-Private Roundtables at the Fourth Clean Energy Ministerial
 
The change.asia - results not reports
The change.asia  - results not reportsThe change.asia  - results not reports
The change.asia - results not reports
 
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank NigamDetecting Reconnaissance Through Packet Forensics by Shashank Nigam
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
 
سمینار آشنائی Ims
سمینار آشنائی Ims  سمینار آشنائی Ims
سمینار آشنائی Ims
 
Better football
Better footballBetter football
Better football
 
HSE-MS Basic
HSE-MS BasicHSE-MS Basic
HSE-MS Basic
 
Breakaway Service
Breakaway ServiceBreakaway Service
Breakaway Service
 
Visualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical ReflectionVisualizing Critique: Strategies for Critical Reflection
Visualizing Critique: Strategies for Critical Reflection
 
Ống kính và cảm biến trong hệ thống CCTV
Ống kính và cảm biến trong hệ thống CCTVỐng kính và cảm biến trong hệ thống CCTV
Ống kính và cảm biến trong hệ thống CCTV
 
CEREC 30
CEREC 30CEREC 30
CEREC 30
 
Civic sports
Civic sportsCivic sports
Civic sports
 
謎コンテンツ制作者向けアンケート第1段:集計結果
謎コンテンツ制作者向けアンケート第1段:集計結果謎コンテンツ制作者向けアンケート第1段:集計結果
謎コンテンツ制作者向けアンケート第1段:集計結果
 
Antenille's Motivation Theories Presentation
Antenille's Motivation Theories PresentationAntenille's Motivation Theories Presentation
Antenille's Motivation Theories Presentation
 
Jeremiah Jones Resume SBA
Jeremiah Jones Resume SBAJeremiah Jones Resume SBA
Jeremiah Jones Resume SBA
 
A London Tale of Gin and Sin
A London Tale of Gin and SinA London Tale of Gin and Sin
A London Tale of Gin and Sin
 
Creative education summit
Creative education summitCreative education summit
Creative education summit
 
小中学生のスマートフォンの使用を禁止すべきか?
小中学生のスマートフォンの使用を禁止すべきか?小中学生のスマートフォンの使用を禁止すべきか?
小中学生のスマートフォンの使用を禁止すべきか?
 

Similar to Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Getting Your Electronic World Working for You
Getting Your Electronic World Working for YouGetting Your Electronic World Working for You
Getting Your Electronic World Working for YouCarol Thomson-Duvall
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentationDavid Lombrozo
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-TechiesRichard Bush
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 

Similar to Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting (20)

ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Internet
InternetInternet
Internet
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Getting Your Electronic World Working for You
Getting Your Electronic World Working for YouGetting Your Electronic World Working for You
Getting Your Electronic World Working for You
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-Techies
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

More from OWASP Delhi

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesOWASP Delhi
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeoverOWASP Delhi
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report WritingOWASP Delhi
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air GapOWASP Delhi
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container EscapesOWASP Delhi
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using TerraformOWASP Delhi
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash GoelOWASP Delhi
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarOWASP Delhi
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanOWASP Delhi
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraOWASP Delhi
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraOWASP Delhi
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraOWASP Delhi
 

More from OWASP Delhi (20)

Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
Securing dns records from subdomain takeover
Securing dns records from subdomain takeoverSecuring dns records from subdomain takeover
Securing dns records from subdomain takeover
 
Effective Cyber Security Report Writing
Effective Cyber Security Report WritingEffective Cyber Security Report Writing
Effective Cyber Security Report Writing
 
Data sniffing over Air Gap
Data sniffing over Air GapData sniffing over Air Gap
Data sniffing over Air Gap
 
UDP Hunter
UDP HunterUDP Hunter
UDP Hunter
 
Demystifying Container Escapes
Demystifying Container EscapesDemystifying Container Escapes
Demystifying Container Escapes
 
Automating WAF using Terraform
Automating WAF using TerraformAutomating WAF using Terraform
Automating WAF using Terraform
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
Cloud assessments by :- Aakash Goel
Cloud assessments  by :- Aakash GoelCloud assessments  by :- Aakash Goel
Cloud assessments by :- Aakash Goel
 
Pentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang BhatnagarPentesting Rest API's by :- Gaurang Bhatnagar
Pentesting Rest API's by :- Gaurang Bhatnagar
 
Wireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit RanjanWireless security beyond password cracking by Mohit Ranjan
Wireless security beyond password cracking by Mohit Ranjan
 
IETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit BatraIETF's Role and Mandate in Internet Governance by Mohit Batra
IETF's Role and Mandate in Internet Governance by Mohit Batra
 
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj MishraMalicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
Malicious Hypervisor - Virtualization in Shellcodes by Adhokshaj Mishra
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj MishraThwarting The Surveillance in Online Communication by Adhokshaj Mishra
Thwarting The Surveillance in Online Communication by Adhokshaj Mishra
 

Recently uploaded

Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...nirzagarg
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 

Recently uploaded (20)

Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 

Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting

  • 1. Presentation by : Priyanka Tomar priyanka@newerasystem.com
  • 2. Objective  Provide a brief idea of cyber/computer attacks and preventive measure to be adopted with reference to Law Enforcement Agencies.
  • 3. PREREQUISITES  Computer Hardware  Computer Software  Internet Surfing  Email  Networking  IP Address
  • 4. Combating Cyber Crime  Cyber + Security  What is Security  What is Cyber Security  involves detection, prevention and responding to attacks  Why do we need Cyber Security –Phishing, Credit Card Frauds
  • 5. Combating Cyber Crime  Who is Vulnerable –e.g. screen hack
  • 6. Cyber Security Threats  Virus  Worm  Trojan Horse  Remote Administration Tool – Prorat, Poison Ivy
  • 7. Cyber Security Threats-RAT The operator controls the RAT through a network connection. RAT provide an operator the following capabilities:  Screen/camera control.  File management (download/upload/execute etc.  Shell control (from command prompt).  Computer control (power off/on/log off).  Registry management (query/add/delete/modify).  Start, stop and restart Windows services.  Copy/delete files and format disks.  View and clear the windows event logs.  Other software product-specific functions.
  • 8. Cyber Security Threats  Hackers  Identity Thieves  Spyware/Adware  Website advertisements
  • 9. Consequences of Inaction  Loss of access  Loss of confidentiality, integrity and public trust  Lawsuits, Disciplinary action The US has charged six members of an international cybercrime gang that hacked into user accounts to defraud eBay's Stubhub ticket reselling website of about $1m. The men were arrested in the UK, Canada and Spain in connection with the scam in which more than 1,600 StubHub users had their credit cards used to buy tickets, which were then sold on by the criminals.
  • 10. Preventive Measures -I  OS/Software Updates  Anti virus  Personal Firewalls  Check Open Ports -http://www.auditmypc.com/firewall-test.asp
  • 11. How to block Ports  Block Ports  Control Panel>System and Security> Windows Firewall  Advanced Settings  See inbound and outbound rules  Create your own rule
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. How to know if there is spyware?  Endless pop-up windows.  Redirected to other websites automatically.  Random Windows error messages .  Computer suddenly seems slow.  New and unexpected toolbars appear in web browser.  New and unexpected icons appear in the task tray.  Browser's home page suddenly changed.  Search engine your browser opens has been changed.
  • 17.  Don't click on links within pop-up windows  Be careful while installing free software , never forget to read user agreement.  Block pop-up windows and cookies by adjusting browser preferences.  Be aware of unexpected dialog boxes asking -Do you want to run a xxxx program . Always select "no" or "cancel," or close the dialog box. Prevent Spyware Installation
  • 18. Remove Spyware  Spyware copies several files to different directories and changes the registry. Use a spyware remover - a program dedicated to removal of sypware.  Run a legitimate product to remove spyware e.g Ad-Aware, Microsoft Window Defender, Webroot's SpySweeper etc.
  • 19. Preventive Measures-II  Prevent Identity Theft-Beware of phishing scams - a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal/ financial account information. These often do not include a personal salutation. Never enter personal information into an online form you accessed via a link in an email you were not expecting. Legitimate businesses will not ask for personal information online.  Intrusion Detection Software/Device
  • 20. Phishing Google Security Team to Sunitha Verification Required. Dear Gmail User, The Gmail infrastructure is going through an annual security and performance overhaul. In the same respect, you are requested to verify your account by clicking on the following link. The Google Security Team is available to provide you all the assistance for secure communication over the Internet. Happy surfing! accountverification.gmail.com/src/verify.php?confirmation=dhPGcsiuUNdnAoN77q5CHwCgl4MmCAXE 72d You are requested to act on this immediately to guarantee the smooth functioning of your mail account. Thanks, Account Security Administrator Google Security Team Google, Inc. Phone: +1 650-253-0000 You are receiving this message from Google because you are a valued member. Google respects your privacy. To learn more, please read our online Privacy Statement. For more information or for general questions regarding your e-mail account, please visit Gmail Help. Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043. All rights reserved.
  • 21. Preventive Measures  Protect Passwords  Regular Backup
  • 22. Preventive Measures -II  Setup Cyber Security Policies  Email Virus Filtering Services  Firewall Services  Email attachment Filtering  Vulnerability Scanning  Intrusion Prevention System