0% found this document useful (0 votes)
354 views

Cyber Crime in A Nutshell

This document summarizes cybercrime trends and issues. It discusses how cybercrime has evolved from pre-2000 crimes like hacking to now include identity theft, financial fraud, and cyberbullying. The top cyber threats are attacks on social networks, phishing, and data exfiltration. Cybercrime affects many groups like teenagers, women, and India which ranks fifth globally for cybercrime. The document provides tips to protect computers and warns about the lack of effective cyber forensics in India to investigate crimes.

Uploaded by

Majid Shahgholi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
354 views

Cyber Crime in A Nutshell

This document summarizes cybercrime trends and issues. It discusses how cybercrime has evolved from pre-2000 crimes like hacking to now include identity theft, financial fraud, and cyberbullying. The top cyber threats are attacks on social networks, phishing, and data exfiltration. Cybercrime affects many groups like teenagers, women, and India which ranks fifth globally for cybercrime. The document provides tips to protect computers and warns about the lack of effective cyber forensics in India to investigate crimes.

Uploaded by

Majid Shahgholi
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

CYBERCRIME IN A NUTSHELL: Social Perspective

By A.Shahgholi & H.barzegar

Introduction

In the News.
1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com) California warns of massive ID theft personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com)

E-Commerce Network - Suzanne Mello Nov 5 2004

Cybercrime in General
What is cybercrime? When did it all start? Who is involved? Why do they do it?
Pre-2000cybercrime Post-2000 cybercrime

There are two main categories of cyber crime.

1.

2.

The first type targets computer devices or computer networks directly. The second type targets independent computer devices or computer networks, but are facilitated by computer devices or computer networks

there are two separate and distinct elements to cybercrime.


1. On the one hand you have an element of exploiting weaknesses in the computer operating system or computer network. On the other hand you have an element of exploiting social fabric of a computer network, whereby a criminal makes use of the computer network to infiltrate the trust of other users of that computer network for profit or gain.

2.

Cyber security and Cybercrime


In particular, this includes the adoption of appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect the integrity of national critical infrastructures. At the national level, this is a shared responsibility requiring coordinated action related to the prevention, preparation, response, and recovery from incidents on the part of government authorities, the private sector and citizens.

What are general reasons, for hacking, by cyber-criminals?


Gathering Trophies (quest to become famous) General Mischief Financial Gain Revenge Protest Criminal activity Identity Theft Forging Documents and Message.

Top 10 Cyber Security Threats of 2011 and Beyond


1. 2. 3. 4. Attacks via USB Large-scale targeted botnet attacks Ddos attacks Increased attacks on and via social networks 5. Click jacking and cross-site scripting 6. Phishing attacks from `trusted` third party 7. Online fraud and money mules 8. Cloud computing concerns 9. Data exfiltration and insider threats 10. Attacks on mobile device and wireless network

Top ten cyber crime skills in high demand


1.Coders/programmers 2. Distributors 3.Tech experts 4. Hackers 5. Fraudsters 6. Hosted systems providers 7. Cashiers 8. Money mules 9.Tellers 10. Organization Leaders
http://www.esetindia.com

Cybercrime effects
Effects of cyber crime Cyber Fear In Teenager: These days a worst fear in teenagers eyes is Cyber Bullying Cyber crime against woman in India: Cyber crime is a global phenomenon. 1. Harassment via e-mail 2. cyber stalking, 3. Cyber pornography 4. defamation 5. morphing 6. e-mail spoofing

Complainant Demographic by Age

Cyber crime versus India


. At the same time, India ranks fifth in the world for cyber crime, according to a report last year by the U.S.-based Internet Crime Complaint Center, a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center. Even under the IT Act, investigations in India are not easy. This is mainly due to the lack of what is called cyber forensics.

Protect your Computers!


Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Dont use words found in a dictionary. Remember that password cracking tools exist Back-up your computer data on disks or CDs often Don't share access to your computers with strangers password protect it

If you have a wi-fi network,


Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info too!

E-Commerce Network Suzanne Mello - Nov 5 2004

Conclusion

References
1. K.Jaishankar; Cyber Criminology; CRC PRESS; 2011; . 2. Allison Gavanagh; Sociology in the age of internet; open university press; 2007;.. 3. Nir kshetri; The Global Cyber Crime Industry; Spinger; 2010; 4. Carl timm & Rechard perez; Seven Deadliest Social Network Attacks; syngress; 2010; . 5. Jeffrey lan Ross; Cybercrime; chealse house; 2010; . 6. Susan W.Brenner; Criminal threat from cyber space; Green wood; 2010; . 7. Christian w.probst ; Insider threats in cyber security; springer; 2010; . 8. Anthony reyes; cyber crime and digital forensics;syngress; 2007; . 9. Michael Cross; sense of the cyber crime; syngress;2008; . 10. IC3; Top 10 Countries by Count; Individual Complainants (Numbered by Rank); http://www.ic3.gov/media/annualreport/2010_ic3report.pdf ; 2010; 11. Mac marketing chart; top ten internet crime; http://www.marketingcharts.com/ ; 2010; . 12. Charles P.Pfleeger; analyzing computer security; paul boger;2011; .

Thank you all very much for taking the time to listen to this presentation
Sri K.Suresh Babu Assistant professor of JNTU [email protected] AbdolMajid Shahgholi M.Tech , JNTU [email protected] HamidReza Barzegar M.Tech, JNTU [email protected] School of Information Technology, Jawaharlal Nehru Technological University, Hyderabad

19

You might also like