CYBER CRIMES Affecting the world

Embed Size (px)

Citation preview

  • 8/7/2019 CYBER CRIMES Affecting the world

    1/26

    CYBER CRIMES

    AFFECTING THE

    WORLD??..

    Suchandra and Adarsh 1

  • 8/7/2019 CYBER CRIMES Affecting the world

    2/26

    Cyber Crime: Computer crime, orcybercrime, refers to any crime that

    involves a computerand a network. The computer may have been used in the commission of a

    crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of

    the Internet. Issues surrounding this type of crime have become high-profile,

    particularly those surrounding hacking, copyrightinfringement, child pornography, and child grooming.

    There are also problems

    ofprivacy when confidential information is lost or intercepted,lawfully or otherwise.

    Suchandra and Adarsh 2

  • 8/7/2019 CYBER CRIMES Affecting the world

    3/26

    cyber crimes can be divided into one of twotypes of categories:

    1. crimes that target computer networks ordevices directly.

    2. crimes facilitated by computer networks ordevices, the primary target of which is

    independent of the computer network ordevice.

    Suchandra and Adarsh 3

  • 8/7/2019 CYBER CRIMES Affecting the world

    4/26

    Examples of crimes that primarily target computer networks or devices would include: Computer viruses Denial-of-service attacks Malware (malicious code)

    Examples of crimes that merely use computer networks or devices would include:

    Cyberstalking Fraud and identity theft Information warfare Phishing scams

    Suchandra and Adarsh 4

  • 8/7/2019 CYBER CRIMES Affecting the world

    5/26

    Threats: IIlicit Activities

    Hackers: enjoy intellectual challenges ofovercoming software limitations and how to

    increase capabilities of systemsCrackers: illegally break into other peoplessecure systems and networks

    Cyber Terrorists: threaten and attack other

    peoples computers to further a social orpolitical agenda

    Suchandra and Adarsh 5

  • 8/7/2019 CYBER CRIMES Affecting the world

    6/26

    Motivation for Hackers:

    The challenge... because its there!

    Ego

    Espionage Ideology

    Mischief

    Money (extortion or theft) Revenge

    Suchandra and Adarsh 6

  • 8/7/2019 CYBER CRIMES Affecting the world

    7/26

    Threats: Illicit Activities

    Malware Writers: responsible for thecreation of malicious software

    Samurai: hackers hired to legally entersecure computer/network environments

    Phreakers: Focus on defeatingtelephone systems and associatedcommunication technologies

    Suchandra and Adarsh 7

  • 8/7/2019 CYBER CRIMES Affecting the world

    8/26

  • 8/7/2019 CYBER CRIMES Affecting the world

    9/26

    Zombie BotNets

    Botnet is a jargon term for a collection of software robots, orbots, which run autonomously. This can also refer to thenetwork of computers using distributed computing software.

    While the term "botnet" can be used to refer to any group ofbots, the word is generally used to refer to a collection ofcompromised machines (zombies) running programs, usuallyreferred to as worms, Trojan horses, or backdoors, under acommon command and control infrastructure. A botnet'soriginator (aka "bot herder") can control the group remotely,and usually for nefarious purposes such as the sending ofmass spam.

    Suchandra and Adarsh 9

  • 8/7/2019 CYBER CRIMES Affecting the world

    10/26

    Phishing

    Phishing is a technique used by strangers to"fish" for information about you, informationthat you would not normally disclose to astranger, such as your bank account number,PIN, and other personal identifiers such asyour National Insurance number. Thesemessages often contain company/bank logosthat look legitimate and use flowery or

    legalistic language about improving security byconfirming your identity details.

    Suchandra and Adarsh 10

  • 8/7/2019 CYBER CRIMES Affecting the world

    11/26

    PhishingExample

    Suchandra and Adarsh 11

  • 8/7/2019 CYBER CRIMES Affecting the world

    12/26

    Computer Viruses, Worms, Trojan Horses, Spyware &

    Other Malware Computer virus: program which can copy itself and surreptitiously infect

    another computer, often via shared media such as a floppy disk, CD, thumbdrive, shared directory, etc. Viruses are always embedded within another fileor program.

    Worm: self-reproducing program which propagates via the network.

    Trojan horse: program which purports to do one thing, but secretly doessomething else; example: free screen saver which installs a backdoor

    Root kit: set of programs designed to allow an adversary to surreptitiouslygain full control of a targeted system while avoiding detection and resistingremoval, with the emphasis being on evading detection and removal

    Botnet: set of compromised computers ("bots" or "zombies") under the

    unified command and control of a "botmaster;" commands are sent to botsvia a command and control channel (bot commands are often transmittedvia IRC, Internet Relay Chat).

    Spyware: assorted privacy-invading/browser-perverting programs

    Malware: an inclusive term for all of the above -- "malicious software"Suchandra and Adarsh 12

  • 8/7/2019 CYBER CRIMES Affecting the world

    13/26

    Spam

    E-mail spam, also known as junk e-mail orunsolicitedbulk e-mail (UBE), is a subset ofspam that involves nearlyidentical messages sent to numerous recipients by e-mail.

    Definitions of spam usually include the aspects that e-mail isunsolicited and sent in bulk.

    One subset of UBE is UCE(unsolicited commercial e-mail).

    Spam accounts for 9 out of every 10 emails in the UnitedStates.

    Suchandra and Adarsh 13

  • 8/7/2019 CYBER CRIMES Affecting the world

    14/26

    There are several types of Malware..Viruses ::

    Conceal themselves

    Infect computer systems

    Replicate themselves

    Deliver a payload

    Suchandra and Adarsh 14

  • 8/7/2019 CYBER CRIMES Affecting the world

    15/26

    Threats: MALWARE

    Malware is Malicious Software -deliberately created and specifically

    designed to damage, disrupt or destroynetwork services, computer data andsoftware

    Suchandra and Adarsh 15

  • 8/7/2019 CYBER CRIMES Affecting the world

    16/26

    There are several types of MalwareViruses which affect as follows..

    Conceal themselves

    Infect computer systems

    Replicate themselves

    Deliver a payload

    Suchandra and Adarsh 16

  • 8/7/2019 CYBER CRIMES Affecting the world

    17/26

    Malware Types

    Worms:

    Programs that are capable ofindependently propagating throughout acomputer network.

    They replicate fast and consume large

    amounts of the host computers memory

    Suchandra and Adarsh 17

  • 8/7/2019 CYBER CRIMES Affecting the world

    18/26

    Malware Types

    Trojan Horses:

    Programs that contain hidden functionality

    that can harm the host computer andthe data it contains.

    THs are not automatic replicators -computer users inadvertently set themoff.

    Suchandra and Adarsh 18

  • 8/7/2019 CYBER CRIMES Affecting the world

    19/26

    Malware Types

    Software Bombs:

    Time Bombs - triggered by a specific

    time/dateLogic Bombs - triggered by a specific

    event

    Both are introduced some time before andwill damage the host system

    Suchandra and Adarsh 19

  • 8/7/2019 CYBER CRIMES Affecting the world

    20/26

    What do you think motivates

    Malware writers to create andunleash these attacks?

    20Suchandra and Adarsh

  • 8/7/2019 CYBER CRIMES Affecting the world

    21/26

    Malware Writer Motivations

    To see how far the virus can spread

    To cause damage and destruction to a

    targeted individual or organisation To achieve a feeling of superiority/power

    To leverage some form of personal gain

    To provide a lesson in Internet security

    To conduct an experiment

    Suchandra and Adarsh 21

  • 8/7/2019 CYBER CRIMES Affecting the world

    22/26

  • 8/7/2019 CYBER CRIMES Affecting the world

    23/26

    Protect your Computers!

    Use anti-virus software andfirewalls - keep them up to date

    Keep your operating system upto date with critical security

    updates and patches

    Don't open emails orattachments from unknownsources

    Use hard-to-guess passwords.Dont use words found in adictionary. Remember thatpassword cracking tools exist

    Back-up your computer data ondisks or CDs often

    Don't share access to yourcomputers with strangers

    If you have a wi-fi network,

    password protect it Disconnect from the Internet

    when not in use

    Reevaluate your security on aregular basis

    Make sure your employees andfamily members know this infotoo!

    Suchandra and Adarsh 23

  • 8/7/2019 CYBER CRIMES Affecting the world

    24/26

    Additional points To 5 countries affected by cyber crimes

    are 1.USA 2.CHINA 3.RUSSIA

    4.BRAZIL 5.INDIA.

    The world loses 557 million$ anually tocyber crime.

    Computer crime rises 57% year by year.

    Suchandra and Adarsh 24

  • 8/7/2019 CYBER CRIMES Affecting the world

    25/26

    A final word:

    Treat your password like youtreat your toothbrush. Nevergive it to anyone else to use, andchange it every few months

    Suchandra and Adarsh 25

  • 8/7/2019 CYBER CRIMES Affecting the world

    26/26

    Suchandra and Adarsh 26