SlideShare una empresa de Scribd logo
1 de 29
WELCOME TO WORLD OF
INVESTIGATION
Introduction to
Cyber Crime &
Digital Evidences
Raghu Khimani
Cyber Crime Expert / Advisor
Contact: raghukhimani2007@gmail.com
It is rightly said that..
• Yesterday we were afraid of rockets destroying buildings and
computer centers... , Today we should be aware of software
destroying rockets and missiles!!
DIGITAL CRIME
• Digital Crime is any illegal activity involving an information technology
infrastructure, including: unauthorized or illegal access, interception
(by technical means of transmissions of computer data to, from or
within a computer system), data interference (unauthorized damaging,
deletion, deterioration, alteration or suppression of computer data),
systems interference (interfering with the functioning of a computer
system by inputting, transmitting, damaging, deleting, deteriorating,
altering or suppressing computer data).
Definition of Cyber Crime as per IT ACT 2000
• Cyber crime refers to all the activities done with criminal intent in
cyber space or using the medium of Internet. These could be either
the criminal activities in the conventional sense or activities, newly
evolved with growth of the new medium. Any activity, which
basically offends human sensibilities, can be included in the ambit
of Cyber Crime.
INDIAN SCENARIO
• As is being seen world over, cyber crimes are on the rise in India also and so are the arrests made in cyber
crimes cases.
• According to “Crime in India 2016” report published by NCRB, there has been an increase of over 9.30% in the
number of cyber crimes reported under The Information Technology Act 2000 (IT Act) in 2016 over the
corresponding figures for 2015.
• A total of 12317 cases under IT Act and cyber crimes under IPC provisions were registered during the year
2016. The following four major categories of crimes were reported in India as per NCRB constitutes nearly
90% of the cyber crimes:
1. Hacking of Computer System
2. Forgery / counterfeiting using Computers
3. Publication / Transmission of obscene information in electronic form i.e. Pornography
4. Breach of Trust / Frauds.
INDIAN SCENARIO
• Cyber Crime Motives – Year 2016
1. Illegal Gain
2. Revenge
3. Insult to Modesty of Women
4. Extortion / Blackmailing
5. Sexual Exploitation
6. Causing Disrepute
7. Developing Own Business / Interest
8. Political Motives
9. Disrupt Public Services
10.Piracy
11.Steal information for Espionage
12.Sale / Purchase of Illegal Drugs / Other
Items
INDIAN SCENARIO
• Some states which have taken lead in establishing Cyber Crime Police
Stations and, Cyber Crime Cells have shown registration of larger number of
Cyber Crime cases than the states which do not have such specialized focus.
• According to Director, CBI, “The use of modern technology has resulted in
traditional crime becoming global. This has made the task of investigation
more difficult and complex. There are several examples of kidnapping,
terrorist attacks, economic crimes, bank frauds and financial scams being
committed with the help of computers”. Thus, the task before the law
enforcement authorities is going to grow in complexity and, urgent focus is
needed to build capacity to tackle this growing menace.
TYPES OF CYBER CRIMES
Types of Cyber
Crimes
Crimes In Which
Computer Systems
Are Used As
Tools/Instruments
Crimes Targeting to
Computer System
Crimes Targeting Computer Systems
• Under Section 66 ITAA 2008Hacking
• Under Section 66 of ITAA 2008
Denial of Service
(DoS) attack or
Distributed Denial-
of-Service (DDoS)
attack
• Under Section 66 of ITAA,2008 or Sec.66F
ITAA,2008 in case if it is done against
country or to strike terror in the people
Spreading Viruses &
Malware
• Under Section 66 of ITAA 2008 or Sec. 66F
ITAA, 2008 in case if it is done against
country or to strike terror in the people
Website Defacement
Crimes Targeting Computer Systems
• Under Section 66F ITAA 2008
Cyber
Terrorism
• Under Section 66A, 66D of ITAA 2008Spoofing
• Under Section 66C of ITAA 2008Skimming
• Under Section 66C, 66D of ITAA 2008Pharming
• Under Section 66A of ITAA 2008Spamming
Crimes In Which Computer Systems Are Used
As Tools/Instruments
Financial Fraud
• Several sections
under IPC, ITAA -
2008 and other
applicable laws
Data
Modification
• Under Section 66 of
ITAA 2008 and
sections
403,406,408,409 of
IPC as applicable
Identity Theft
And It’s Misuse
• Under Section 66C,
66D of ITAA 2008
Cyber
Bullying/Stalking
• Under Section 66A
of ITAA 2008 and
sections
500,504,506,507,50
8,509 of IPC as
applicable
Crimes In Which Computer Systems Are Used
As Tools/Instruments
Data Theft
• Under Section 66 of
ITAA 2008 and
section 379 IPC
Pornography
• Under Section66E,
67, 67A and 67 B of
ITAA 2008 and
section 292 IPC
Theft Of Trade
Secrets And
Intellectual Property
• Under Section 66 of
ITAA 2008, IPR laws
and other
applicable laws
Espionage On
Protected
Systems
• Under Sections 66,
70 of ITAA 2008
and other
applicable laws
Tools and Techniques used to Commit Cyber
Crimes
• Cyber Crimes make use of various tools and techniques and
many of these tools are used for the commission of the
cybercrimes and are installed on the victim’s systems through
- exploitation of the vulnerabilities in the systems / networks
or by surreptitiously gaining access to the victim’s systems
which may include physical access or by making use of the
intermediary systems or by deceiving the victim to allow
access to his system or by gathering the victim information.
Buffer
Overflow:
The condition when a program or process tries to store
more data in a buffer (temporary data storage area) than
it was intended to hold. Since buffers are created to
contain a finite amount of data, the extra information -
which has to go somewhere - can overflow into adjacent
buffers, corrupting or overwriting the valid data held in
them.
Cracking:
Cracking is breaking into someone else’s computer
system, often on a network; bypassing passwords or
licenses in computer programs; or in other ways
intentionally breaches computer security. A cracker can
be doing this either for profit, or maliciously, or for some
purpose or cause.
Data
Didling:
Involves altering the raw data just before a computer
processes it and then changing it back after
processing is completed.
Malware:
A program that is inserted into a system, usually
covertly, with the intent of compromising the
confidentiality, integrity, or availability of the victim’s
data, applications, or operating system or of
otherwise annoying or disrupting the victim.
Phishing:
Using spoof E-mails or directing the people to fake
web sites to deceive them into divulging personal
financial details so that criminals can access their
accounts.
Rootkit:
A set of tools that enables continued privileged access to a
computer, while actively hiding its presence from the
administrator. Typically, a cracker installs a rootkit on a
computer after first obtaining user-level access, either by
exploiting a known vulnerability or cracking a password. Once
the rootkit is installed, it allows the attacker to mask intrusion
and gain root or privileged access to the computer and,
possibly, other machines on the network
Salami
Attack:
A programmed attack which is implemented in small
(meant to be unnoticeable) increments. This attack
involves making alteration so insignificant that it is
easily concealed and would go completely unnoticed.
Attacks are used for commission of financial crimes.
Sniffer:
A program and/or device that monitors data traveling over
a network. Sniffers can be used both for legitimate
network management functions and for stealing
information off a network. Unauthorized sniffers can be
extremely dangerous to a network’s security because they
are virtually impossible to detect and can be inserted
almost anywhere.
Social
Engineering:
A hacker term which involves non-technical intrusion
for deceiving or manipulating unwitting people into
giving out information about a network or how to
access it.
Spoofing:
Refers to a situation in which the incoming information
from an attacker is masked as one that appears to come
from a trusted source to the recipient or to the recipient
network. Often the messages from the fraudster
appearing to be from a genuine source (like bank), seeks
personally identifiable information to perpetrate fraud on
the victim.
Spyware:
It is a type of malware that is secretly or surreptitiously
installed into an information system to gather information
on individuals or organisations without their knowledge; a
type of malicious code.
Steganography:
The art and science of writing hidden messages in
such a way that no one, apart from the sender and
intended recipient, suspects the existence of the
message. An image file may contain hidden messages
between terror groups, which will be known only to
the intended recipient and the sender.
Trojan:
A malicious program that masquerades as a benign
application and can take complete control of the
victim’s computer system.
Virus: A self-replicating program that runs and spreads by
modifying other programs or files.
A self-replicating, self-propagating, self-contained
program that uses networking mechanisms to spread
itself.
A program that is installed on a system to cause it to
attack other systems.
Worm:
Zombie:
Some Examples of Cyber Crime
• E-mail Account Hacking
• E-mail Spoofing
• E-mail Bombing
• Cyber Stalking
• Cyber Defamation
• Online Gambling
• Credit Card Fraud
• Online Share Trading Fraud
• Source Code Theft
• Tax Evasion & Money Laundering (- to transfer
illegal money online)
• Theft of Confidential Info.
• Pornography
• Online Sale of Illegal Articles
• Usenet Newsgroup (Forums)
• Virus Dissemination
• Web Defacement
• Web Jacking
• Email Frauds
• Software Piracy
• Music Piracy
• Intellectual Property Crimes
• Drug Trafficking
• Proxy Scan
• Cyber Terrorism
• Social Engineering Scams
• Forgery
• Data Diddling (altering the raw data)
• Denial of Service Attack
• Salami Attacks
• Trojans & Key loggers
• Internet Time Theft
Preventing Cyber-Crime
• General Tips:
• Do not give out identifying information such as your name, home address, or
telephone number in a chat room. Even vital details like age, gender should never
be disclosed to anyone.
• Do not send your photograph to any one on the net unless you know the person
well enough.
• Do not respond to messages or bulletin board items that are obscene or
threatening.
• Never arrange a face-to-face meeting with someone who you have just ‘met’ on the
Internet. In case you have to meet this person, make sure you have someone with
you for the meeting. And inform someone of the person and place you will be going
to. Remember, people online are not always who they seem to be.
• E-mail Safety:
• If you ever get an email containing an embedded link, and a
request for you to enter secret details, treat it as suspicious.
• Do not input any sensitive information that might help provide
access to your bank accounts, even if the page appears
legitimate.
• No reputable company ever sends emails of this type.
• Virus Warning:
• Virus warnings are a very common occurrence in the mail box.
• While you shouldn’t take these warnings lightly, a lot of times,
such warnings are hoaxes and will do more harm than good.
• Always check the story out by visiting an anti-virus site such as
Quick Heal, McAfee or Symantec before taking any action,
including forwarding them to friends and colleagues.
How to report Cyber-Crime?
• Filing a complaint/ Writing an application letter
• Includes your details like name, email address, telephone number and specific
details on how offence was committed along with names and addresses of
suspects.
• Type of documents should be included in application which can be
considered as proof or evidence in regard to your complaint.
• E-mail printouts which should contain full email header information,
• Chat-room or newsgroup text or screenshots if taken by you,
• Transaction acknowledgements or receipts,
• Credit card records, transaction details and receipts,
• Envelopes or letters received via post courier,
• FAX copies and Phone bills,
• Printed or preferably electronic copies of web pages
• What should you do if you believe your complaint is time
sensitive?
• You should contact your local police station directly if you believe your matter is
time sensitive.
• For more complicated cases, you can get the crime related
information on other below mentioned web sites links:-
• If you think you or anyone you know are in immediate danger, please
contact your local police station or main control room (Phone no. 100)
immediately! Online reporting should NEVER be used in the event of an
emergency requiring immediate attention.
Mumbai Police www.mumbaipolice.org
Pune Police www.punepolice.com
Thane Police www.thanepolice.org
Indian Computer Emergency
Response Team (CERT-IN)
www.cert-in.org
How to Fulfill Your Role as Concerned Citizens?
• Use anti-virus , spyware software and firewalls - keep them up to date
• Keep your operating system up to date with critical security updates and patches
• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that
password cracking tools exist
• Back-up your computer data on disks or CDs often
• Don't share access to your computers with strangers
• If you have a Wi-Fi network, password protect it
• Disconnect from the Internet when not in use
• Reevaluate your security on a regular basis
• Make sure your employees and family members know this info too!
• Don't open emails or attachments from unknown sources
Investigating Cyber Crime
•5 Questions for Investigators:
• Why – Why someone committed the crime?
• Who – Who committed the crime?
• When – When did he/they do it?
• Where – Where did they do it?
• How – How was it done?
Introduction to Cyber Crime

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Ppt
PptPpt
Ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Similar a Introduction to Cyber Crime

Similar a Introduction to Cyber Crime (20)

2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdfcyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Más de Dr Raghu Khimani

Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniDr Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniDr Raghu Khimani
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Dr Raghu Khimani
 
Narcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesNarcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesDr Raghu Khimani
 
Analysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholAnalysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholDr Raghu Khimani
 
Examination of chemicals in trap cases
Examination of chemicals in trap casesExamination of chemicals in trap cases
Examination of chemicals in trap casesDr Raghu Khimani
 

Más de Dr Raghu Khimani (14)

Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu KhimaniTracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Precursor chemicals
Precursor chemicalsPrecursor chemicals
Precursor chemicals
 
Poisons
PoisonsPoisons
Poisons
 
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
Introduction to Toxicology and Forensic Toxilogical Examination and it's sign...
 
Narcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic SubtancesNarcotic Drugs & Psychotropic Subtances
Narcotic Drugs & Psychotropic Subtances
 
Analysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcoholAnalysis of illicit liquor including methyl & ethyl alcohol
Analysis of illicit liquor including methyl & ethyl alcohol
 
Examination of chemicals in trap cases
Examination of chemicals in trap casesExamination of chemicals in trap cases
Examination of chemicals in trap cases
 
Analysis of jaggery
Analysis of jaggeryAnalysis of jaggery
Analysis of jaggery
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Introduction to Cyber Crime

  • 1. WELCOME TO WORLD OF INVESTIGATION
  • 2. Introduction to Cyber Crime & Digital Evidences Raghu Khimani Cyber Crime Expert / Advisor Contact: raghukhimani2007@gmail.com
  • 3. It is rightly said that.. • Yesterday we were afraid of rockets destroying buildings and computer centers... , Today we should be aware of software destroying rockets and missiles!!
  • 4. DIGITAL CRIME • Digital Crime is any illegal activity involving an information technology infrastructure, including: unauthorized or illegal access, interception (by technical means of transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data).
  • 5. Definition of Cyber Crime as per IT ACT 2000 • Cyber crime refers to all the activities done with criminal intent in cyber space or using the medium of Internet. These could be either the criminal activities in the conventional sense or activities, newly evolved with growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of Cyber Crime.
  • 6. INDIAN SCENARIO • As is being seen world over, cyber crimes are on the rise in India also and so are the arrests made in cyber crimes cases. • According to “Crime in India 2016” report published by NCRB, there has been an increase of over 9.30% in the number of cyber crimes reported under The Information Technology Act 2000 (IT Act) in 2016 over the corresponding figures for 2015. • A total of 12317 cases under IT Act and cyber crimes under IPC provisions were registered during the year 2016. The following four major categories of crimes were reported in India as per NCRB constitutes nearly 90% of the cyber crimes: 1. Hacking of Computer System 2. Forgery / counterfeiting using Computers 3. Publication / Transmission of obscene information in electronic form i.e. Pornography 4. Breach of Trust / Frauds.
  • 7. INDIAN SCENARIO • Cyber Crime Motives – Year 2016 1. Illegal Gain 2. Revenge 3. Insult to Modesty of Women 4. Extortion / Blackmailing 5. Sexual Exploitation 6. Causing Disrepute 7. Developing Own Business / Interest 8. Political Motives 9. Disrupt Public Services 10.Piracy 11.Steal information for Espionage 12.Sale / Purchase of Illegal Drugs / Other Items
  • 8. INDIAN SCENARIO • Some states which have taken lead in establishing Cyber Crime Police Stations and, Cyber Crime Cells have shown registration of larger number of Cyber Crime cases than the states which do not have such specialized focus. • According to Director, CBI, “The use of modern technology has resulted in traditional crime becoming global. This has made the task of investigation more difficult and complex. There are several examples of kidnapping, terrorist attacks, economic crimes, bank frauds and financial scams being committed with the help of computers”. Thus, the task before the law enforcement authorities is going to grow in complexity and, urgent focus is needed to build capacity to tackle this growing menace.
  • 9. TYPES OF CYBER CRIMES Types of Cyber Crimes Crimes In Which Computer Systems Are Used As Tools/Instruments Crimes Targeting to Computer System
  • 10. Crimes Targeting Computer Systems • Under Section 66 ITAA 2008Hacking • Under Section 66 of ITAA 2008 Denial of Service (DoS) attack or Distributed Denial- of-Service (DDoS) attack • Under Section 66 of ITAA,2008 or Sec.66F ITAA,2008 in case if it is done against country or to strike terror in the people Spreading Viruses & Malware • Under Section 66 of ITAA 2008 or Sec. 66F ITAA, 2008 in case if it is done against country or to strike terror in the people Website Defacement
  • 11. Crimes Targeting Computer Systems • Under Section 66F ITAA 2008 Cyber Terrorism • Under Section 66A, 66D of ITAA 2008Spoofing • Under Section 66C of ITAA 2008Skimming • Under Section 66C, 66D of ITAA 2008Pharming • Under Section 66A of ITAA 2008Spamming
  • 12. Crimes In Which Computer Systems Are Used As Tools/Instruments Financial Fraud • Several sections under IPC, ITAA - 2008 and other applicable laws Data Modification • Under Section 66 of ITAA 2008 and sections 403,406,408,409 of IPC as applicable Identity Theft And It’s Misuse • Under Section 66C, 66D of ITAA 2008 Cyber Bullying/Stalking • Under Section 66A of ITAA 2008 and sections 500,504,506,507,50 8,509 of IPC as applicable
  • 13. Crimes In Which Computer Systems Are Used As Tools/Instruments Data Theft • Under Section 66 of ITAA 2008 and section 379 IPC Pornography • Under Section66E, 67, 67A and 67 B of ITAA 2008 and section 292 IPC Theft Of Trade Secrets And Intellectual Property • Under Section 66 of ITAA 2008, IPR laws and other applicable laws Espionage On Protected Systems • Under Sections 66, 70 of ITAA 2008 and other applicable laws
  • 14. Tools and Techniques used to Commit Cyber Crimes • Cyber Crimes make use of various tools and techniques and many of these tools are used for the commission of the cybercrimes and are installed on the victim’s systems through - exploitation of the vulnerabilities in the systems / networks or by surreptitiously gaining access to the victim’s systems which may include physical access or by making use of the intermediary systems or by deceiving the victim to allow access to his system or by gathering the victim information.
  • 15. Buffer Overflow: The condition when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Cracking: Cracking is breaking into someone else’s computer system, often on a network; bypassing passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this either for profit, or maliciously, or for some purpose or cause.
  • 16. Data Didling: Involves altering the raw data just before a computer processes it and then changing it back after processing is completed. Malware: A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or of otherwise annoying or disrupting the victim.
  • 17. Phishing: Using spoof E-mails or directing the people to fake web sites to deceive them into divulging personal financial details so that criminals can access their accounts. Rootkit: A set of tools that enables continued privileged access to a computer, while actively hiding its presence from the administrator. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the network
  • 18. Salami Attack: A programmed attack which is implemented in small (meant to be unnoticeable) increments. This attack involves making alteration so insignificant that it is easily concealed and would go completely unnoticed. Attacks are used for commission of financial crimes. Sniffer: A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network’s security because they are virtually impossible to detect and can be inserted almost anywhere.
  • 19. Social Engineering: A hacker term which involves non-technical intrusion for deceiving or manipulating unwitting people into giving out information about a network or how to access it. Spoofing: Refers to a situation in which the incoming information from an attacker is masked as one that appears to come from a trusted source to the recipient or to the recipient network. Often the messages from the fraudster appearing to be from a genuine source (like bank), seeks personally identifiable information to perpetrate fraud on the victim.
  • 20. Spyware: It is a type of malware that is secretly or surreptitiously installed into an information system to gather information on individuals or organisations without their knowledge; a type of malicious code. Steganography: The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. An image file may contain hidden messages between terror groups, which will be known only to the intended recipient and the sender.
  • 21. Trojan: A malicious program that masquerades as a benign application and can take complete control of the victim’s computer system. Virus: A self-replicating program that runs and spreads by modifying other programs or files. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. A program that is installed on a system to cause it to attack other systems. Worm: Zombie:
  • 22. Some Examples of Cyber Crime • E-mail Account Hacking • E-mail Spoofing • E-mail Bombing • Cyber Stalking • Cyber Defamation • Online Gambling • Credit Card Fraud • Online Share Trading Fraud • Source Code Theft • Tax Evasion & Money Laundering (- to transfer illegal money online) • Theft of Confidential Info. • Pornography • Online Sale of Illegal Articles • Usenet Newsgroup (Forums) • Virus Dissemination • Web Defacement • Web Jacking • Email Frauds • Software Piracy • Music Piracy • Intellectual Property Crimes • Drug Trafficking • Proxy Scan • Cyber Terrorism • Social Engineering Scams • Forgery • Data Diddling (altering the raw data) • Denial of Service Attack • Salami Attacks • Trojans & Key loggers • Internet Time Theft
  • 23. Preventing Cyber-Crime • General Tips: • Do not give out identifying information such as your name, home address, or telephone number in a chat room. Even vital details like age, gender should never be disclosed to anyone. • Do not send your photograph to any one on the net unless you know the person well enough. • Do not respond to messages or bulletin board items that are obscene or threatening. • Never arrange a face-to-face meeting with someone who you have just ‘met’ on the Internet. In case you have to meet this person, make sure you have someone with you for the meeting. And inform someone of the person and place you will be going to. Remember, people online are not always who they seem to be.
  • 24. • E-mail Safety: • If you ever get an email containing an embedded link, and a request for you to enter secret details, treat it as suspicious. • Do not input any sensitive information that might help provide access to your bank accounts, even if the page appears legitimate. • No reputable company ever sends emails of this type. • Virus Warning: • Virus warnings are a very common occurrence in the mail box. • While you shouldn’t take these warnings lightly, a lot of times, such warnings are hoaxes and will do more harm than good. • Always check the story out by visiting an anti-virus site such as Quick Heal, McAfee or Symantec before taking any action, including forwarding them to friends and colleagues.
  • 25. How to report Cyber-Crime? • Filing a complaint/ Writing an application letter • Includes your details like name, email address, telephone number and specific details on how offence was committed along with names and addresses of suspects. • Type of documents should be included in application which can be considered as proof or evidence in regard to your complaint. • E-mail printouts which should contain full email header information, • Chat-room or newsgroup text or screenshots if taken by you, • Transaction acknowledgements or receipts, • Credit card records, transaction details and receipts, • Envelopes or letters received via post courier, • FAX copies and Phone bills, • Printed or preferably electronic copies of web pages
  • 26. • What should you do if you believe your complaint is time sensitive? • You should contact your local police station directly if you believe your matter is time sensitive. • For more complicated cases, you can get the crime related information on other below mentioned web sites links:- • If you think you or anyone you know are in immediate danger, please contact your local police station or main control room (Phone no. 100) immediately! Online reporting should NEVER be used in the event of an emergency requiring immediate attention. Mumbai Police www.mumbaipolice.org Pune Police www.punepolice.com Thane Police www.thanepolice.org Indian Computer Emergency Response Team (CERT-IN) www.cert-in.org
  • 27. How to Fulfill Your Role as Concerned Citizens? • Use anti-virus , spyware software and firewalls - keep them up to date • Keep your operating system up to date with critical security updates and patches • Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist • Back-up your computer data on disks or CDs often • Don't share access to your computers with strangers • If you have a Wi-Fi network, password protect it • Disconnect from the Internet when not in use • Reevaluate your security on a regular basis • Make sure your employees and family members know this info too! • Don't open emails or attachments from unknown sources
  • 28. Investigating Cyber Crime •5 Questions for Investigators: • Why – Why someone committed the crime? • Who – Who committed the crime? • When – When did he/they do it? • Where – Where did they do it? • How – How was it done?

Notas del editor

  1. Deterioration = બગાડવું The difference between damage and deterioration is that damage is injury or harm; the condition or measure of something not being intact while deterioration is the process of making or growing worse, or the state of having grown worse. Data suppression is used whenever there is chance that the information contained in a publicly available report could be used to reveal or infer the identities of specific individuals.
  2. Cyber space = WWW Conventional = પરંપરાગત Offends = displeases = નાખુશ કરવું Sensibilities = સંવેદનશીલતા Ambit = area
  3. Perpetration = ગુનો Prosecution = કાર્યવાહી Constraint = અવરોધ Intangible = unable to be touched; not having physical presence
  4. NCRB – National Crime Record Bureau Forgery / Counterfeiting = બનાવટી / નકલી કાગળ બનાવવા Obscene = અશ્લીલ Breach of Trust = વિશ્વાસ ભંગ Fraud = છેતરપીંડી
  5. Modesty = મર્યાદા Espionage = જાસુસી
  6. Menace = જોખમ / ખતરો
  7. ITAA = IT Act Amendment Website Defamation = A website defacement is an attack on a website that changes the visual appearance of the site or a webpage.
  8. Cyber Terrorism = Cyberterrorism is the use of Internet attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Spoofing = In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Skimming (FRAUD) = A form of white collar crime, skimming is slang for taking cash "off the top" of the daily receipts of a business (or from any cash transaction involving a third interested party) and officially reporting a lower total. – Example of Restaurant, Call Centers, ATM Pharming = Pharming (pronounced 'farming') is a form of online fraud very similar to phishing as pharmers rely upon the same bogus websites and theft of confidential information. Spamming = Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising. As well as sending messages repeatedly on the same site.
  9. Cyber Bullying / Stalking = Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. Cyber-bullying could be limited to posting rumors or gossips about a person in the internet bringing about hatred in other’s minds; or it may go to the extent of personally identifying victims and publishing materials severely defaming and humiliating them.
  10. Trade Secrets = A trade secret is an invented formula, practice, process, design, instrument, pattern, commercial method, or compilation of information which is not generally known or reasonably ascertainable by others, and by which a business can obtain an economic advantage over competitors or customers. Espionage on Protected Systems = Espionage or, casually, spying involves a spy ring, government, company/firm or individual obtaining information considered secret or confidential without the permission of the holder of the information. – Intelligence Gathering for Military or IB Dept.
  11. Exploitation = લાભપ્રદ ઉપયોગ Vulnerabilities = નબળાઈ Exploitation of the vulnerabilities = નબળાઈઓ નો લાભપ્રદ ઉપયોગ (Ex. NO Antivirus) Surreptitiously = ગુપ્ત રીતે Deceiving = છેતરીને
  12. Covertly = છૂપી રીતે Integrity =પ્રમાણિકતા Annoying =હેરાન કરવું Disrupting =ભાંગી નાખવું, છિન્નભિન્ન કરી નાખવું.
  13. Deceive = છેતરવું Divulging = જાહેર કરાવવું Intrusion = ઘૂસણખોરી
  14. Legitimate = કાયદેસર
  15. Intrusion = ઘૂસણખોરી Deceive = છેતરવું Unwitting = અજાણ
  16. Surreptitiously = છુપી રીતે
  17. Benign = Gentle, Kindly Propagate = Spread and promote widely
  18. Email spoofing = the creation of email messages with a forged sender address. An attacker alters his identity so that some one thinks he is some one else . Email Bombing = repeatedly sending an email message to a particular address in an attempt to overflow the mailbox or overwhelm the server. Cyber stalking = the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization Cyber Defamation = The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (Disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc) Tax Evasion = કરચોરી & Money Laundering = પૈસાની ગેરકાયદે હેરફેર કરવી અને પૈસા છુપાવવા Virus Dissemination = It just means deliberately releasing/spreading a computer virus. Web Defacement = Hack the website and paste their own page. Drug Trafficking = the cultivation, manufacturing, distribution, and sale of drugs that are subject to drug prohibition laws Cyber Terrorism = the use of Internet based attacks in terrorist activities. Data Diddling = Altering of raw data. Internet Time Theft = the use by an unauthorized person of the Internet hours paid for by another person. Web Jacking = Social Engineering sites phishing. Email fraud = is the intentional deception made for personal gain or to damage another individual through email.