SlideShare a Scribd company logo
1 of 21
CyberCrime
statistics and probability (STA-133)
Submitted to
Tajmary Mahfuz
Submitted by
 S.M.Mustofa Kauser
143-15-4515
 Mahhud Sowrov
143-15-41528
 Bib Yammin
143-15-4598
 Md. Rezwanul Islam
143-15-4574
 Sabbir Ahmed
143-15-4520
Presentation Topics
Cybercrime- About cybercrime, Definition, What kind of
people do this.
Crime Graph- Top twenty list & explanation.
Cyber Attacks- Attack Techniques, Motivations
Behind Attacks, Industry & Organization Drill-Down
Bangladesh Bank Tragedy- How to hack, bank
governor resigns
Cyber security- Security measures, Step to cyber
security.
About Cybercrime
Computer crime, or cybercrime, is crime that involves a computer and a
network.
The computer may have been used in the commission of a crime, or it may be
the target. Internationally, both governmental and non-state actors
engage in cybercrimes, including espionage, financial thif, and other
cross-border crimes.
Cyber’s Most Wanted
Evgeniy Bogachev
Conspiracy to racketeering
activity related to Zeus malware
Peteris Sahurovs
Unauthorized access to
protected computer; wire
fraud
Crime Graph
Symantec has ranked 20 countries that face, or cause, the
most cybercrime. In compiling such a list, Symantec was able to
quantify software code that interferes with a computer's normal
functions, rank zombie systems, and observe the number of
websites that host phishing sites, which are designed to trick
computer users into disclosing personal data or banking account
information. The highest rate of cybercrime was found to be in the
United States which may mainly contribute to the broad range of
available broadband connections, which are those that allow
uninterrupted internet connectivity.
All of the contributing factors allowed Symantec to effectively rank
a top 20 list of countries that have the most cybercrime.
List of Top 20 Countries with the highest rate of
Cybercrime (source: Business Week/Symantec)
Each country lists 6 contributing factors, share of malicious
computer activity, malicious code rank, spam zombies rank, phishing web
site hosts rank and attack origin, to substantiate its cybercrime ranking.
1. United States of America
Share of malicious computer activity: 23%
Malicious code rank: 1
Spam zombies rank: 3
Phishing web site hosts rank: 1
Attack origin rank: 1
2. China
Share of malicious computer activity: 9%
Malicious code rank: 2
Spam zombies rank: 4
Phishing web site hosts rank: 6
Attack origin rank: 2
3. India
Share of malicious computer activity: 3%
Malicious code rank: 3
Spam zombies rank: 11
Phishing web site hosts rank: 22
Attack origin rank: 19
Cyber Attacks
It’s now time to publish the statistics derived from the Cyber Attacks
Timelines of February
Cyber Crime ranks on top of the Motivations Behind Attacks chart with
62.7%, substantially stable and in line with January (was 60.6%).
Hacktivism ranks at number two, nearly with the same value reported in
January (28% vs 27.7%).
Cyber Espionage ranks at number three with 5.3% (was 7.4% in
January), while attacks motivated by Cyber Warfare are equally
substantially stable with 4% (was 4.3% in January).
The Attack Techniques were unknown in 41.3% of the cases. Account
Hijackings are immediately behind with 12%, and SQLi achieve an
impressive 10.7%. Impressive are also the percentages of targeted attacks
(9.3%) and malware (6.7%).
Bangladesh Bank Tragedy
The recent cyber attack on Bangladesh's central bank that let hackers stole
over $80 Million from the institutes' Federal Reserve bank account was
reportedly caused due to the Malware installed on the Bank's computer s
ystems. The criminal group was able to steal a total value of about $81
Million from the Federal Reserve's Bangladesh account through a s
eries of fraudulent transactions, but a typo in some transaction
revented a further $850 Million Heist.
A further $81m went to four accounts in the Philippines, purportedly for
payments in relation to Bangladeshi infrastructure projects, including
bridges, a power station and the Dhaka metro. That money then
disappeared into the casino industry and has yet to be recovered.
In both Bangladesh and the Philippines, politicians and government
officials are furious at the bankers for failing to stop the crime. Emmanuel
Dooc, a lawyer for the Anti-Money Laundering Council (AMLC) in the
Philippines, said the country urgently needed regulatory reform. “The
lesson we learnt from this is unmistakable … There are gaping holes in our
laws.”
Atiur Rahman, Bangladesh Bank governor, left, resigned on Tuesday; Maia
Santos Deguito, manager of the Jupiter Street branch Of RCBC, right, invoked her
right to silence at hearing into the heist to avoid any self-incrimination
Bangladesh central bank governor resigns over $81m cyber heist
Bangladesh’s central bank governor, Atiur Rahman, said on Tuesday he had
resigned after $81m (£75m) was stolen from the bank’s account at t
he Federal Reserve Bank of New York in one of the largest cyber-
heists in history.
Cyber Security
“What is causing even more concern is that the origin of these
crimes is widely based abroad in countries including China, Pakistan,
Bangladesh and Algeria among others,” D.S Rawat, secretary general,
ASSOCHAM said while releasing the joint ASSOCHAM-Mahindra SSG study
“Cyber and Network Security Framework”.
These attacks have been observed to be originating from the cyber s
pace of a number of countries including the US, of Europe, Brazil,
Turkey, China, Pakistan, Bangladesh, Algeria and the UAE, h
ighlighted the study.
Security measures
A state of computer "security" is the conceptual ideal, attained by the use of
the three processes: threat prevention, detection, and response. These
processes are based on various policies and system components, which
include the following:
User account access controls and cryptography can protect systems files and
data, respectively.
Intrusion Detection System (IDS) products are designed to detect
network attacks in-progress and assist in post-attack forensics,
while audit trails and logs serve a similar function for Individual s ystems.
Cyber crime
Cyber crime

More Related Content

What's hot

Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crimeManish Singh
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 

What's hot (20)

Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 

Similar to Cyber crime

State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxmattinsonjanel
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Mohamed N. El-Guindy
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceSyed Danish Ali
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogITrust - Cybersecurity as a Service
 

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Surname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docxSurname 2Briana CastilloCyber Crime6-16-15.docx
Surname 2Briana CastilloCyber Crime6-16-15.docx
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insurance
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlog
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 

Recently uploaded

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Cyber crime

  • 2. statistics and probability (STA-133) Submitted to Tajmary Mahfuz Submitted by  S.M.Mustofa Kauser 143-15-4515  Mahhud Sowrov 143-15-41528  Bib Yammin 143-15-4598  Md. Rezwanul Islam 143-15-4574  Sabbir Ahmed 143-15-4520
  • 3. Presentation Topics Cybercrime- About cybercrime, Definition, What kind of people do this. Crime Graph- Top twenty list & explanation. Cyber Attacks- Attack Techniques, Motivations Behind Attacks, Industry & Organization Drill-Down Bangladesh Bank Tragedy- How to hack, bank governor resigns Cyber security- Security measures, Step to cyber security.
  • 4. About Cybercrime Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial thif, and other cross-border crimes.
  • 5. Cyber’s Most Wanted Evgeniy Bogachev Conspiracy to racketeering activity related to Zeus malware Peteris Sahurovs Unauthorized access to protected computer; wire fraud
  • 6.
  • 7. Crime Graph Symantec has ranked 20 countries that face, or cause, the most cybercrime. In compiling such a list, Symantec was able to quantify software code that interferes with a computer's normal functions, rank zombie systems, and observe the number of websites that host phishing sites, which are designed to trick computer users into disclosing personal data or banking account information. The highest rate of cybercrime was found to be in the United States which may mainly contribute to the broad range of available broadband connections, which are those that allow uninterrupted internet connectivity. All of the contributing factors allowed Symantec to effectively rank a top 20 list of countries that have the most cybercrime.
  • 8. List of Top 20 Countries with the highest rate of Cybercrime (source: Business Week/Symantec) Each country lists 6 contributing factors, share of malicious computer activity, malicious code rank, spam zombies rank, phishing web site hosts rank and attack origin, to substantiate its cybercrime ranking. 1. United States of America Share of malicious computer activity: 23% Malicious code rank: 1 Spam zombies rank: 3 Phishing web site hosts rank: 1 Attack origin rank: 1
  • 9. 2. China Share of malicious computer activity: 9% Malicious code rank: 2 Spam zombies rank: 4 Phishing web site hosts rank: 6 Attack origin rank: 2 3. India Share of malicious computer activity: 3% Malicious code rank: 3 Spam zombies rank: 11 Phishing web site hosts rank: 22 Attack origin rank: 19
  • 10. Cyber Attacks It’s now time to publish the statistics derived from the Cyber Attacks Timelines of February Cyber Crime ranks on top of the Motivations Behind Attacks chart with 62.7%, substantially stable and in line with January (was 60.6%). Hacktivism ranks at number two, nearly with the same value reported in January (28% vs 27.7%).
  • 11. Cyber Espionage ranks at number three with 5.3% (was 7.4% in January), while attacks motivated by Cyber Warfare are equally substantially stable with 4% (was 4.3% in January).
  • 12. The Attack Techniques were unknown in 41.3% of the cases. Account Hijackings are immediately behind with 12%, and SQLi achieve an impressive 10.7%. Impressive are also the percentages of targeted attacks (9.3%) and malware (6.7%).
  • 13.
  • 14. Bangladesh Bank Tragedy The recent cyber attack on Bangladesh's central bank that let hackers stole over $80 Million from the institutes' Federal Reserve bank account was reportedly caused due to the Malware installed on the Bank's computer s ystems. The criminal group was able to steal a total value of about $81 Million from the Federal Reserve's Bangladesh account through a s eries of fraudulent transactions, but a typo in some transaction revented a further $850 Million Heist.
  • 15. A further $81m went to four accounts in the Philippines, purportedly for payments in relation to Bangladeshi infrastructure projects, including bridges, a power station and the Dhaka metro. That money then disappeared into the casino industry and has yet to be recovered.
  • 16. In both Bangladesh and the Philippines, politicians and government officials are furious at the bankers for failing to stop the crime. Emmanuel Dooc, a lawyer for the Anti-Money Laundering Council (AMLC) in the Philippines, said the country urgently needed regulatory reform. “The lesson we learnt from this is unmistakable … There are gaping holes in our laws.” Atiur Rahman, Bangladesh Bank governor, left, resigned on Tuesday; Maia Santos Deguito, manager of the Jupiter Street branch Of RCBC, right, invoked her right to silence at hearing into the heist to avoid any self-incrimination
  • 17. Bangladesh central bank governor resigns over $81m cyber heist Bangladesh’s central bank governor, Atiur Rahman, said on Tuesday he had resigned after $81m (£75m) was stolen from the bank’s account at t he Federal Reserve Bank of New York in one of the largest cyber- heists in history.
  • 18. Cyber Security “What is causing even more concern is that the origin of these crimes is widely based abroad in countries including China, Pakistan, Bangladesh and Algeria among others,” D.S Rawat, secretary general, ASSOCHAM said while releasing the joint ASSOCHAM-Mahindra SSG study “Cyber and Network Security Framework”. These attacks have been observed to be originating from the cyber s pace of a number of countries including the US, of Europe, Brazil, Turkey, China, Pakistan, Bangladesh, Algeria and the UAE, h ighlighted the study.
  • 19. Security measures A state of computer "security" is the conceptual ideal, attained by the use of the three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following: User account access controls and cryptography can protect systems files and data, respectively. Intrusion Detection System (IDS) products are designed to detect network attacks in-progress and assist in post-attack forensics, while audit trails and logs serve a similar function for Individual s ystems.