Awareness Against Cyber Crime
-
Upload
nithin-raj -
Category
Education
-
view
204 -
download
3
Transcript of Awareness Against Cyber Crime
www.securethelock.comPhone: +91(949)68 41 523 | e-mail: [email protected]
Huge amount of money is lost every year due to cyber crimes
Around 2 Million+ people loose their jobs annually due to cyber crimes
The average time to resolve a cyber attack was 32 days, with an average cost incurred during this period of $1,035,769, or $32,469 per day.
In India, loss due to cyber crimes is around 21% percent of the GDP.
Why Should you careabout security ?
Cyber Crime
Report indicates that India has a Net loss of around 21 percent of total GDP per year
[
I
www.securethelock.comPhone: +91(949)68 41 523 | e-mail: [email protected]
PayPal
SEA hacked PayPal recently which put millions of user information's and credentials at risk but luckily hackers didn’t misuse it.
APPLE
Apple’s Developer portal has been hacked info about its 275,000 registered third-party developers who use it has been stolen.
GMAIL
5 Million Gmail user credentials has been leaked online with both username/Passwords publically to a Russian Forum
SONY PLAYSTATION
77 Million user credit card information where stolen in the PlayStation hack of 2011 and Sony shuts down the network for 42 days.
Cyber crimesEver increasing ?
Types Of Internet Frauds
Credit/Debit Card Fraud
Business Deceit
Recruitment Deceit
Counterfeit Cheque Scam
Advance Fee Fraud
Non-Delivery of Goods/Service Fraud
Spoofing/Phishing Scam
Investment Rip-Off
Identity Theft
Ponzi/Pyramid Fraud
Auction Fraud
Nigerian 4-1-9 Scam
How To Be Safe From Internet Frauds?
Know who you’re dealing with.
Look for information about how complaints are handled.
Be aware that no complaints is no guarantee.
Don’t believe promises of easy money. Understand the offer.
Resist pressure.
Think twice before entering contests operated by unfamiliar companies. Be cautious about unsolicited emails.
Beware of imposters.
Guard your personal information.
Beware of “dangerous downloads.”
Pay the safest way.
Malicious code
Malicious code - it is any hardware, software, or firmware that is intentionally included or inserted in a system for a harmful purpose.
It includes computer viruses, worms, Trojan horses, key loggers, BOTs, Rootkits, and any software security exploits.
It also includes spyware, which are deceptive programs, installed without authorization, “that monitor a consumer’s activities without their consent
Prevention
Antivirus can be used to prevent propagation of malicious code.
Heuristics such as file analysis and file emulation are also used to identify and remove malicious programs
Install a Firewall - it is a hardware and/or software that is designed to be your first line of defense against unauthorized users accessing your system.
Trademark
Legal identity of an individual or firm provided over products or services to consumers.
Can be a name, word, phrase, symbol, design, image or logo
In India, Trademark registration is maintained under The Trade Marks Act, 1999.
- TRADEMARK - REGISTERED TRADEMARK`
How It Becomes Cyber Crime?
Conflict arises when attempts were done by trademark holders to enforce right over domain names
Cybersquatting - is registering, trafficking in, or using a domain name with bad faith, intent to profit from the goodwill of a trademark belonging to someone else.
Cyber squatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.
Typosquatting, also called URL hijacking or fake url, relies on mistakes - typographical errors -made by Internet users when inputting a website address into a web browser.
Identity Theft
Account Takeover is a kind of situation where the criminal uses the information which he has stolen in order to have the access of victim's existing accounts. Then there may be further misuse using the existing accounts like changing the address so that bill does not reach to victim's place and criminal can enjoy shopping and purchases online through the credit cards the thief runs up.
True Name Theft, the thief by using the personal information of the victim opens new accounts. In this the thief can open new credit card, cellular phones number, check books of the existing account and may misuse all. Online facilities of banking and credit cards called net baking has made things very easy for these sort of thefts, where only passwords or codes are the keys to do anything and real verification has no role to play as such.
Identity theft actually is way through which criminals somehow obtains the personal information of people who identity they want to use for any illegal purpose.
Here are two broad types of identity theft- account takeover`- true name theft
Protection
Learn about product AND seller
Understand retailer’s refund policies
Select a secure password
Use secure checkout (look for https)
Things too good almost always are
Use a specific credit card for e-shopping. Monitor frequently with on-line access (web, quicken, etc.)
Limit opportunities for bank account access. Consider separate accounts at different banks
File A Report
If you are a victim, file a Police report with LOCAL Police or Police where identity theft occurred, if knownGet a copy and retain for your records
Get information on the assigned investigation and keep phone numbers available for verification
Contact ALL CreditorsContact billing inquires and security department
Change passwords
Close unused or unnecessary accounts
Monitor activity closely
What is Copyright ?
As the very name suggests is the law related to the authorization rights to copy or useanything.
Copyright law of India in operated under the Indian Copyright Act, 1957.
It is the authorization or rights given by the law to original creators of literary, dramatic,musical and artistic works and producers of cinematographic films and sound recordings.
In fact, it is a bundle of rights including, inter alia, rights of reproduction,communication to the public, adaptation and translation of the work.
Is Copyright Infringement A Criminal Offence?
Yes. Any person who knowingly infringes or abets the infringement of the copyright in anywork commits criminal offence under Section 63 of the Copyright Act.
This Act protects the original work or an artist/author which can be a literary, dramatic,musical, artistic, cinematographic films and sound records from unauthorized uses.
This Act does not protect ideas and only covers the scope of expressions unlike patent lawwhich protects the idea.
Why Should CopyrightBe Protected?
This Act provides a safeguard to the authorization rights of the producer or author of thecreation, which protects and inhibits the usage of the original work in any form without thepermission of the author.
This act thus protects and encourages the creativity of any artist or author. It covers thescope of any writer, artist, designer, cinematographer, musician, sound records andcomputer software, etc.
There are certain conditions where some work can be reproduced without thepermissions of the owner such as a research, study, comment, review and news reportingas well as the use of works in Library and Schools and in the legislatures.
In addition to all the rights applicable to a literary work, owner of the copyright in acomputer program enjoys the rights to sell or give on hire or offer for sale or hire, regardless ofwhether such a copy has been sold or given on hire on earlier occasion.
News cannot be protected under Copyright Act but certain ways of presentation the newscan be copyrighted.
Copyrights of works of the countries mentioned in the International Copyright Order areprotected in India, as if such works are Indian works.
Hacking
The name HACKER used for an exceptionally talented programmer.
However, these days it is largely used for people practicing unauthorized and unethical use ofinternet and other network resources.
Hacking is considered a crime in most of the countries.
However, there are times when the police or investigation teams require the help of hackers tosolve a case.
Hacking done for such a purpose is not regarded as unauthorized.
How?
Hacking is done via network programming. Hackers prepare programs to break network codesand passwords.
You didn't possess enough programming knowledge!
You are no longer required to have extensive knowledge about network programming in orderto accomplish this task. With the hacking methods becoming easier and tools getting cheaper,cyber crime is on the rise.
Why?
While some hackings are done just for fun others are done for stealing information yet othersare done for personal reasons such as taking revenge from someone and so on.
Stealing someone's personal data for own use, breaking through into a company's account andmaking changes in their database.
It has been noted that hackers have hacked millions of computers across the globe and thenumber is increasing with every passing day.
Accessing someone's network and hacking for several other similar reasons is a punishableoffence
Cyber Crime Impact
Even though the level of awareness of cyber threats has increased, illegal profits have reached amazing figures.
It’s necessary to work together to avoid the costs the global community suffers, which we can no longer sustain.