SlideShare a Scribd company logo
1 of 28
Cybersecurity
-A CASE
STUDY
Meaning
• Cybercrime is any criminal activity that involves a
computer, networked device or a network. While most
cybercrimes are carried out in order to generate profit for
the cybercriminals, some cybercrimes are carried out
against computers or devices directly to damage or
disable them, while others use computers or networks to
spread malware, illegal information, images or other
materials. Some cybercrimes do both -- i.e., target
computers to infect them with viruses, which are then
spread to other machines and, sometimes, entire networks.
RANSOMWARE IS A TYPE OF
MALICIOUS SOFTWARE, OR
MALWARE, DESIGNED TO DENY
ACCESS TO A COMPUTER
SYSTEM OR DATA UNTIL A
RANSOM IS
PAID. RANSOMWARE TYPICALLY
SPREADS THROUGH PHISHING
EMAILS OR BY UNKNOWINGLY
VISITING AN INFECTED
WEBSITE. RANSOMWARE CAN
BE DEVASTATING TO AN
INDIVIDUAL OR AN
ORGANIZATION.
SOLETSGOTOONEOF BIGGESTSOURCE WHERE
MOSTOF CYBERCRIMEHAPPEN
UNDERSTANDING DARKWEB AND
TOR
LAYERS OF INTERNET
What is the DARKweb?
 All information that cannot be indexed using
general web search engines
 Also known as the deep internet, deepnet, or the
hidden web
Content Found On The Invisible Web
•Private web
•CHILD PONOGRAPHY
••Unlinked content
••Scripted content
••Limited access content
••Databases
•HACKED BANK ACCOUNTS
Advantages Of DARK Web
Content
 Specialized content focus – large amounts of
information focused on an exact subject
 Contains information that might not be available
on the visible web
 Allows a user to find a precise answer to a
specific question
 Allows a user to find webpages from a specific
date or time
So what is actually on the Deep
Web,
and how do we get there?
Deep Web (layer two)
- Content that is only available through
specialized anonymizing software (Tor). This includes
anonymity networks and darknets (anonymous P2P). This are is
a sort of safe- haven for speech and content which has been
banned from the surface web.
- examples: Anonymous chat/imageboards. CP, drugs,
illegal transactions, weapons, DRM removal software, pirated
software/media/ books, black markets.
.onion:
-onion is a domain host suffix designating an anonymous hidden
service reachable via the Tor network.
-The purpose of using such a system is to make both the
information provider and the person accessing theinformation
more difficult to trace, whether by one another, by an intermediate
network host, or by an outsider.
-.onion adresses are 16-character non-mneumonichashes,
compromised of alphabetic and numeric strings.
-The "onion" name refers to onion routing, the technique used by
Tor to achieve a degree of anonymity.
Accessing the Deep Web
Accessing the Deep Web
Tor:
-” The Tor software protects you by bouncing your
communications around a distributed network of relays run by
volunteers all around the world: it prevents somebody watching
your Internet connection from learning what sites you visit, it
prevents the sites you visit from learning your physical location,
and it lets you access sites which are blocked.” –
www.torproject.org
-Tor is a network that supports onion routing; a way to
help make your traffic anonymous. Because the Deep Web is
compromised of information that doesn’t show up on search
engines, or has no domain name registry, you must know
exactly where you are going to get there.
The first step is to download, install, and run the Tor Bundle. This will bring up your new
anonymous browser (through Firefox) in order to get started.
Currency of the Deep Web
Bitcoins:
-an electronic cash system using peer-to-peer networking, digital
signatures and cryptographic proof to enable irreversible payments
between parties without relying on trust. Payments are issued and
transferred by the Bitcoin network.
-Participants begin using Bitcoin by first acquiring a Bitcoin wallet
and one or more Bitcoin addresses. Bitcoin addresses are used for
receiving Bitcoins, similar to how e-mail addresses are used for
receiving e-mail.
-In April 2012, 1 BTC traded at around $4.80. Taking into account
the total number of Bitcoins in circulation, the market capitalization
of the Bitcoin network stands at over 40 million USD
Guided Journey Through the Deep Web
The deep web is vast, as we covered before, and most is private.
Here we will go through some examples of websites on the Deep
Web, how online currency works, and the various resources the
Deep Web encompasses (not all entirely legal)
This content can be disturbing. Obviously with great resources such
as free library databases, and banned books, comes information
that is considered scat. Being a safe-haven from the censorship of
the surface web, there is a lot of CP, arms/drug trade, and other
illegal information on the Deep Web. It’s up to you as an individual
to steer clear of what you don’t want to see.
In addition, one must also be skeptical. There are even sites
dedicated to contract killing, but one can’t be sure that these
websites are even serious.
The next step is to access the Hidden Wiki, which most people consider the home page of the Deep
Web. Here you can begin your journey and discover many different types of sites and networks,
ranging from tame to very illegal. There are black market type sites, hacking information sites, huge
file databases, political advocacy sites, and even sites to hire people to engage in illegal activity.
One of the other “main pages” of the Deep Web is TorDir. TorDir is a site that uses a special
crawler for the Deep Web, so that it may act similar to Google in that it categorizes web sites,
and allows you to view many different and obscure .onion sites that fall into each category.
Through the Hidden Wiki you can find pages like this, which are semi-organized lists of different
.onion sites. Many different sites are listed and separated based on function, such as
buying/selling/trading, communication, hacking, or intel exchange.
This is an example of one of the many online black markets. This one did not require a
paid membership. There are many different ways to spend bit coins, such as on apparel,
money transfers, drugs, books, and even digital goods.
This is an example of someone’s own personal page, with content picked out due to it’s
controversial nature. Here you can find anything from banned readings, to trefelling.
There is content on making one’s own explosives, and many different military type
documents and guidebooks.
There is a huge portion of the Deep Web that is not malicious at all. This is a huge
database of banned, black listed, and forbidden books which you can read and
download. Books have been burned in the past and banned for their controversial
subject matter, and this is a way for history to be preserved.
Another scholarly database, this .onion site is a compilation of financial, business, real
estate, and even marketing tools and texts free to anyone who wants to download them.
The Deep Web is a great archive for educational material.
The Deep Web is full of malicious content. On this Russian-based community hacking
website, one can purchase credit card information, PayPal account information, bank
accounts, and even the service of DDoSing a website. This is when the website is
overloaded with information sent to it, and eventually is forced to shut down.
SOME DISTURBING
VIDEOS
SOME TRUE DARKWEB FACTS
DangersoftheDARKWeb
If you decide to look into the Deep Web on your own
volition, make sure to be careful.
-Have anti-virus protection.
-Have a paid vpn
-Be intelligent about what links you click. The
Deep Web is a haven for Phishers.
-If you don’t want to see any disturbing images
or content, simply browse as text-only.
SHUBH THAKKAR

CREDITS :

More Related Content

What's hot

Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 

Similar to Cyber crime- a case study

Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh BhatiaOWASP Delhi
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 

Similar to Cyber crime- a case study (20)

Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Darknet
DarknetDarknet
Darknet
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Deep web
Deep webDeep web
Deep web
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cyber crime- a case study

  • 2. Meaning • Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers to infect them with viruses, which are then spread to other machines and, sometimes, entire networks.
  • 3. RANSOMWARE IS A TYPE OF MALICIOUS SOFTWARE, OR MALWARE, DESIGNED TO DENY ACCESS TO A COMPUTER SYSTEM OR DATA UNTIL A RANSOM IS PAID. RANSOMWARE TYPICALLY SPREADS THROUGH PHISHING EMAILS OR BY UNKNOWINGLY VISITING AN INFECTED WEBSITE. RANSOMWARE CAN BE DEVASTATING TO AN INDIVIDUAL OR AN ORGANIZATION.
  • 6.
  • 8. What is the DARKweb?  All information that cannot be indexed using general web search engines  Also known as the deep internet, deepnet, or the hidden web
  • 9. Content Found On The Invisible Web •Private web •CHILD PONOGRAPHY ••Unlinked content ••Scripted content ••Limited access content ••Databases •HACKED BANK ACCOUNTS
  • 10. Advantages Of DARK Web Content  Specialized content focus – large amounts of information focused on an exact subject  Contains information that might not be available on the visible web  Allows a user to find a precise answer to a specific question  Allows a user to find webpages from a specific date or time
  • 11. So what is actually on the Deep Web, and how do we get there? Deep Web (layer two) - Content that is only available through specialized anonymizing software (Tor). This includes anonymity networks and darknets (anonymous P2P). This are is a sort of safe- haven for speech and content which has been banned from the surface web. - examples: Anonymous chat/imageboards. CP, drugs, illegal transactions, weapons, DRM removal software, pirated software/media/ books, black markets.
  • 12. .onion: -onion is a domain host suffix designating an anonymous hidden service reachable via the Tor network. -The purpose of using such a system is to make both the information provider and the person accessing theinformation more difficult to trace, whether by one another, by an intermediate network host, or by an outsider. -.onion adresses are 16-character non-mneumonichashes, compromised of alphabetic and numeric strings. -The "onion" name refers to onion routing, the technique used by Tor to achieve a degree of anonymity. Accessing the Deep Web
  • 13. Accessing the Deep Web Tor: -” The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.” – www.torproject.org -Tor is a network that supports onion routing; a way to help make your traffic anonymous. Because the Deep Web is compromised of information that doesn’t show up on search engines, or has no domain name registry, you must know exactly where you are going to get there.
  • 14. The first step is to download, install, and run the Tor Bundle. This will bring up your new anonymous browser (through Firefox) in order to get started.
  • 15. Currency of the Deep Web Bitcoins: -an electronic cash system using peer-to-peer networking, digital signatures and cryptographic proof to enable irreversible payments between parties without relying on trust. Payments are issued and transferred by the Bitcoin network. -Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one or more Bitcoin addresses. Bitcoin addresses are used for receiving Bitcoins, similar to how e-mail addresses are used for receiving e-mail. -In April 2012, 1 BTC traded at around $4.80. Taking into account the total number of Bitcoins in circulation, the market capitalization of the Bitcoin network stands at over 40 million USD
  • 16. Guided Journey Through the Deep Web The deep web is vast, as we covered before, and most is private. Here we will go through some examples of websites on the Deep Web, how online currency works, and the various resources the Deep Web encompasses (not all entirely legal) This content can be disturbing. Obviously with great resources such as free library databases, and banned books, comes information that is considered scat. Being a safe-haven from the censorship of the surface web, there is a lot of CP, arms/drug trade, and other illegal information on the Deep Web. It’s up to you as an individual to steer clear of what you don’t want to see. In addition, one must also be skeptical. There are even sites dedicated to contract killing, but one can’t be sure that these websites are even serious.
  • 17. The next step is to access the Hidden Wiki, which most people consider the home page of the Deep Web. Here you can begin your journey and discover many different types of sites and networks, ranging from tame to very illegal. There are black market type sites, hacking information sites, huge file databases, political advocacy sites, and even sites to hire people to engage in illegal activity.
  • 18. One of the other “main pages” of the Deep Web is TorDir. TorDir is a site that uses a special crawler for the Deep Web, so that it may act similar to Google in that it categorizes web sites, and allows you to view many different and obscure .onion sites that fall into each category.
  • 19. Through the Hidden Wiki you can find pages like this, which are semi-organized lists of different .onion sites. Many different sites are listed and separated based on function, such as buying/selling/trading, communication, hacking, or intel exchange.
  • 20. This is an example of one of the many online black markets. This one did not require a paid membership. There are many different ways to spend bit coins, such as on apparel, money transfers, drugs, books, and even digital goods.
  • 21. This is an example of someone’s own personal page, with content picked out due to it’s controversial nature. Here you can find anything from banned readings, to trefelling. There is content on making one’s own explosives, and many different military type documents and guidebooks.
  • 22. There is a huge portion of the Deep Web that is not malicious at all. This is a huge database of banned, black listed, and forbidden books which you can read and download. Books have been burned in the past and banned for their controversial subject matter, and this is a way for history to be preserved.
  • 23. Another scholarly database, this .onion site is a compilation of financial, business, real estate, and even marketing tools and texts free to anyone who wants to download them. The Deep Web is a great archive for educational material.
  • 24. The Deep Web is full of malicious content. On this Russian-based community hacking website, one can purchase credit card information, PayPal account information, bank accounts, and even the service of DDoSing a website. This is when the website is overloaded with information sent to it, and eventually is forced to shut down.
  • 27. DangersoftheDARKWeb If you decide to look into the Deep Web on your own volition, make sure to be careful. -Have anti-virus protection. -Have a paid vpn -Be intelligent about what links you click. The Deep Web is a haven for Phishers. -If you don’t want to see any disturbing images or content, simply browse as text-only.