cyber crime technology
-
Upload
binu-p-jayan -
Category
Education
-
view
204 -
download
0
Transcript of cyber crime technology
![Page 1: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/1.jpg)
SEMINAR ON
CYBER CRIMETECHNOLOGY
Submitted byRahul js S5 chm
Rollno:32Gptc ndd
![Page 2: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/2.jpg)
IntroductionDefinitionCategories of cyber crime
![Page 3: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/3.jpg)
Defining Cyber CrimeIt’s an unlawful act wherein the computer is either a tool or a target or both.
Acts that are punishable by the Information Technology Act.
Cyber space is a virtual space that has become as important as real space for business, politics, and communities .
![Page 4: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/4.jpg)
INTRODUCTIONThe internet is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
![Page 5: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/5.jpg)
CATEGORIES OF CYBER CRIME:
Cyber crimes can be basically divided into 3 major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
![Page 6: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/6.jpg)
SECOND CATEGORYThese crimes include computer vandalism (destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.
![Page 7: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/7.jpg)
THIRD CATEGORY
Cyber terrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
![Page 8: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/8.jpg)
FIRST CATEGORYCyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be racial, religious, or other.
![Page 9: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/9.jpg)
Types Of Cyber Crime
Modification of a conventional crime by using computers.
Frequently Used Cyber Crimes..
![Page 10: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/10.jpg)
Modification of a conventional crime by using computers.
Financial crimes
Sale of illegal articles
Online gambling
BACK
![Page 11: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/11.jpg)
Frequently Used Cyber Crimes.Unauthorized access to computer systems or networksTheft of information contained in electronic formDenial of Service attack
BACK
![Page 12: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/12.jpg)
CYBER CRIME TECHNOLOGY
![Page 13: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/13.jpg)
BOTNET TECHNOLOGY PHISHING TECHNOLOGY
![Page 14: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/14.jpg)
BOTNET
![Page 15: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/15.jpg)
OUTLINEIntroduction to Botnet Botnet Life-cycleBotnet Detection Preventing Botnet InfectionConclusion
![Page 16: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/16.jpg)
INTRODUCTION A Botnet is a network of
compromised computers under the control of a remote attacker
controller of a botnet is able to direct the activities of these compromised computers
Botnet Terminology Bot Herder (Bot Master) Bot Bot Client IRC Server Command and Control Channel
(C&C)
![Page 17: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/17.jpg)
INTRODUCTION A Botnet is a network of
compromised computers under the control of a remote attacker
controller of a botnet is able to direct the activities of these compromised computers
Botnet Terminology Bot Herder (Bot Master) Bot Bot Client IRC Server Command and Control Channel
(C&C)
![Page 18: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/18.jpg)
INTRODUCTION TO BOTNET(TERMINOLOGY)
IRC ChannelIRC Server
Code Server
IRC ChannelC&C Traffic
Updates
Victim
Attack
Bot Master
![Page 19: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/19.jpg)
BOTNET LIFE-CYCLE
![Page 20: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/20.jpg)
BOTNET LIFE-CYCLE
![Page 21: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/21.jpg)
BOTNET LIFE-CYCLE
![Page 22: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/22.jpg)
BOTNET LIFE-CYCLE
![Page 23: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/23.jpg)
BOTNET DETECTION:TRAFFIC MONITORING
Signature based: Detection of known botnets
Anomaly based: Detect botnet using following anomalies
High network latency High volume of traffic Traffic on unusual port Unusual system behaviour
DNS based: Analysis of DNS traffic generated by botnets
![Page 24: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/24.jpg)
PREVENTING BOTNET INFECTIONSUse a Firewall Use Antivirus (AV) software Deploy an Intrusion Prevention System (IPS) Define a Security Policy and Share Policies with your users systematically
![Page 25: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/25.jpg)
CONCLUSION Botnets pose a significant and growing
threat against cyber security It provides key platform for many
cyber crimes (DDOS) As network security has become
integral part of our life and botnets have become the most serious threat to it
It is very important to detect botnet attack and find the solution for it
![Page 26: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/26.jpg)
![Page 27: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/27.jpg)
PhishingPhishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge.It tries to trick users with official-looking messages
Credit card Bank accounteBayPaypal
Some phishing e-mails also contain malicious or unwantedsoftware that can track your activities or slow your computer
![Page 28: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/28.jpg)
The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient.
So it doesn’t contains any useful information and hence falls under the category of spam.
A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization.Techniques applied to spam message cant be applied naively to phishing messages.
![Page 29: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/29.jpg)
HOW TO PREVENT
1) Detect and block the phishing Web sites in time
2) Enhance the security of the web sites3) Block the phishing e-mails by various
spam filters4) Install online anti-phishing software in
user’s computers
![Page 30: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/30.jpg)
![Page 31: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/31.jpg)
How to avoid PhishingDON’T CLICK THE LINK
Type the site name in your browser (such as www.paypal.com)
Never send sensitive account information by e-mail
Account numbers, SSN, passwordsNever give any password out to anyoneVerify any person who contacts you (phone or email).
If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.
![Page 32: cyber crime technology](https://reader035.fdocuments.net/reader035/viewer/2022062503/58f364161a28abff5a8b45b7/html5/thumbnails/32.jpg)