Awareness Against Cyber Crime

28

Transcript of Awareness Against Cyber Crime

www.securethelock.comPhone: +91(949)68 41 523 | e-mail: [email protected]

Huge amount of money is lost every year due to cyber crimes

Around 2 Million+ people loose their jobs annually due to cyber crimes

The average time to resolve a cyber attack was 32 days, with an average cost incurred during this period of $1,035,769, or $32,469 per day.

In India, loss due to cyber crimes is around 21% percent of the GDP.

Why Should you careabout security ?

Cyber Crime

Report indicates that India has a Net loss of around 21 percent of total GDP per year

[

I

www.securethelock.comPhone: +91(949)68 41 523 | e-mail: [email protected]

PayPal

SEA hacked PayPal recently which put millions of user information's and credentials at risk but luckily hackers didn’t misuse it.

APPLE

Apple’s Developer portal has been hacked info about its 275,000 registered third-party developers who use it has been stolen.

GMAIL

5 Million Gmail user credentials has been leaked online with both username/Passwords publically to a Russian Forum

SONY PLAYSTATION

77 Million user credit card information where stolen in the PlayStation hack of 2011 and Sony shuts down the network for 42 days.

Cyber crimesEver increasing ?

Types Of Internet Frauds

Credit/Debit Card Fraud

Business Deceit

Recruitment Deceit

Counterfeit Cheque Scam

Advance Fee Fraud

Non-Delivery of Goods/Service Fraud

Spoofing/Phishing Scam

Investment Rip-Off

Identity Theft

Ponzi/Pyramid Fraud

Auction Fraud

Nigerian 4-1-9 Scam

How To Be Safe From Internet Frauds?

Know who you’re dealing with.

Look for information about how complaints are handled.

Be aware that no complaints is no guarantee.

Don’t believe promises of easy money. Understand the offer.

Resist pressure.

Think twice before entering contests operated by unfamiliar companies. Be cautious about unsolicited emails.

Beware of imposters.

Guard your personal information.

Beware of “dangerous downloads.”

Pay the safest way.

Malicious code

Malicious code - it is any hardware, software, or firmware that is intentionally included or inserted in a system for a harmful purpose.

It includes computer viruses, worms, Trojan horses, key loggers, BOTs, Rootkits, and any software security exploits.

It also includes spyware, which are deceptive programs, installed without authorization, “that monitor a consumer’s activities without their consent

Prevention

Antivirus can be used to prevent propagation of malicious code.

Heuristics such as file analysis and file emulation are also used to identify and remove malicious programs

Install a Firewall - it is a hardware and/or software that is designed to be your first line of defense against unauthorized users accessing your system.

Trademark

Legal identity of an individual or firm provided over products or services to consumers.

Can be a name, word, phrase, symbol, design, image or logo

In India, Trademark registration is maintained under The Trade Marks Act, 1999.

- TRADEMARK - REGISTERED TRADEMARK`

How It Becomes Cyber Crime?

Conflict arises when attempts were done by trademark holders to enforce right over domain names

Cybersquatting - is registering, trafficking in, or using a domain name with bad faith, intent to profit from the goodwill of a trademark belonging to someone else.

Cyber squatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.

Typosquatting, also called URL hijacking or fake url, relies on mistakes - typographical errors -made by Internet users when inputting a website address into a web browser.

Identity Theft

Account Takeover is a kind of situation where the criminal uses the information which he has stolen in order to have the access of victim's existing accounts. Then there may be further misuse using the existing accounts like changing the address so that bill does not reach to victim's place and criminal can enjoy shopping and purchases online through the credit cards the thief runs up.

True Name Theft, the thief by using the personal information of the victim opens new accounts. In this the thief can open new credit card, cellular phones number, check books of the existing account and may misuse all. Online facilities of banking and credit cards called net baking has made things very easy for these sort of thefts, where only passwords or codes are the keys to do anything and real verification has no role to play as such.

Identity theft actually is way through which criminals somehow obtains the personal information of people who identity they want to use for any illegal purpose.

Here are two broad types of identity theft- account takeover`- true name theft

Protection

Learn about product AND seller

Understand retailer’s refund policies

Select a secure password

Use secure checkout (look for https)

Things too good almost always are

Use a specific credit card for e-shopping. Monitor frequently with on-line access (web, quicken, etc.)

Limit opportunities for bank account access. Consider separate accounts at different banks

File A Report

If you are a victim, file a Police report with LOCAL Police or Police where identity theft occurred, if knownGet a copy and retain for your records

Get information on the assigned investigation and keep phone numbers available for verification

Contact ALL CreditorsContact billing inquires and security department

Change passwords

Close unused or unnecessary accounts

Monitor activity closely

Copyright

What is Copyright ?

As the very name suggests is the law related to the authorization rights to copy or useanything.

Copyright law of India in operated under the Indian Copyright Act, 1957.

It is the authorization or rights given by the law to original creators of literary, dramatic,musical and artistic works and producers of cinematographic films and sound recordings.

In fact, it is a bundle of rights including, inter alia, rights of reproduction,communication to the public, adaptation and translation of the work.

Is Copyright Infringement A Criminal Offence?

Yes. Any person who knowingly infringes or abets the infringement of the copyright in anywork commits criminal offence under Section 63 of the Copyright Act.

This Act protects the original work or an artist/author which can be a literary, dramatic,musical, artistic, cinematographic films and sound records from unauthorized uses.

This Act does not protect ideas and only covers the scope of expressions unlike patent lawwhich protects the idea.

Why Should CopyrightBe Protected?

This Act provides a safeguard to the authorization rights of the producer or author of thecreation, which protects and inhibits the usage of the original work in any form without thepermission of the author.

This act thus protects and encourages the creativity of any artist or author. It covers thescope of any writer, artist, designer, cinematographer, musician, sound records andcomputer software, etc.

There are certain conditions where some work can be reproduced without thepermissions of the owner such as a research, study, comment, review and news reportingas well as the use of works in Library and Schools and in the legislatures.

In addition to all the rights applicable to a literary work, owner of the copyright in acomputer program enjoys the rights to sell or give on hire or offer for sale or hire, regardless ofwhether such a copy has been sold or given on hire on earlier occasion.

News cannot be protected under Copyright Act but certain ways of presentation the newscan be copyrighted.

Copyrights of works of the countries mentioned in the International Copyright Order areprotected in India, as if such works are Indian works.

Hacking

The name HACKER used for an exceptionally talented programmer.

However, these days it is largely used for people practicing unauthorized and unethical use ofinternet and other network resources.

Hacking is considered a crime in most of the countries.

However, there are times when the police or investigation teams require the help of hackers tosolve a case.

Hacking done for such a purpose is not regarded as unauthorized.

How?

Hacking is done via network programming. Hackers prepare programs to break network codesand passwords.

You didn't possess enough programming knowledge!

You are no longer required to have extensive knowledge about network programming in orderto accomplish this task. With the hacking methods becoming easier and tools getting cheaper,cyber crime is on the rise.

Why?

While some hackings are done just for fun others are done for stealing information yet othersare done for personal reasons such as taking revenge from someone and so on.

Stealing someone's personal data for own use, breaking through into a company's account andmaking changes in their database.

It has been noted that hackers have hacked millions of computers across the globe and thenumber is increasing with every passing day.

Accessing someone's network and hacking for several other similar reasons is a punishableoffence

Cyber Crime Impact

Even though the level of awareness of cyber threats has increased, illegal profits have reached amazing figures.

It’s necessary to work together to avoid the costs the global community suffers, which we can no longer sustain.