This document discusses cyber crime and security. It begins with defining cyber crime and providing examples. It then discusses the history of cyber crime, noting the first recorded incident in 1820. It outlines various types of cyber crimes like financial crimes, sale of illegal articles, distributed denial of service attacks, email spoofing, and forgery. It also discusses hackers and why computers are vulnerable. It provides details on the WannaCry ransomware attack of 2017. Finally, it lists ways to protect yourself from cyber crime, such as encrypting data, using firewalls and antivirus software, and being wary of emails and downloads.
This document discusses cyber crime and security. It begins by defining cyber crime and providing examples. It then discusses the history of cyber crime, noting the first recorded incident in 1820. It outlines various types of cyber crimes like financial crimes, sale of illegal articles, distributed denial of service attacks, email spoofing, and forgery. It also discusses hackers and reasons computers are vulnerable. It provides details on the WannaCry ransomware attack and concludes with recommendations on how to protect yourself from cyber crime.
This document discusses cyber crime, cyber security, and cyber rights in India. It begins by defining cyber crime as any criminal activity performed using a computer, where the computer is used as a tool or target. It then covers the history of cyber crimes, categories of cyber crimes, types of cyber criminals, and weapons used in cyber crimes like hacking, viruses, phishing etc. A large portion discusses the Information Technology Act of 2000 and how it defines and punishes various cyber crimes in India such as data theft, hacking, spam, and cyberstalking. It also provides statistics on the scope of cyber crimes in India and why it is a major target. In conclusion, it discusses preparedness and policy initiatives the government is taking
The document discusses various types of cyber crimes such as hacking, data theft, email spoofing, identity theft, child pornography, denial of service attacks, virus dissemination, computer vandalism, cyberterrorism, and software piracy. It provides details on the first recorded cyber crime in 1820, and categorizes cyber crimes as those using computers as targets or weapons. For each crime, it outlines the relevant Indian laws and punishments prescribed under the Information Technology Act and Indian Penal Code.
This document provides an overview of cybercrime, including definitions, common types of cybercrimes like hacking, denial of service attacks, phishing and identity theft. It discusses tools used for hacking and describes phishing techniques. It also outlines India's IT Act and key features. Additionally, it mentions some cyberattacks in India and recommends cyber safety actions like installing updates and using antivirus software.
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
This document provides an overview of cyber crime and forensics. It discusses the types of cyber crimes like hacking, phishing, software piracy and cyber stalking. It also outlines the steps of computer forensics which include acquisition, identification, evaluation and presentation of digital evidence. Common tools used in computer forensics are also mentioned.
This document discusses various types of cyber crimes such as hacking, child pornography, denial of service attacks, virus dissemination, cyber terrorism, and software piracy. It provides examples of the earliest recorded cyber crime in 1820 and describes how hackers illegally access computer systems. The text also addresses how the internet enables sexual abuse of children worldwide and how cyber criminals flood networks to deprive victims of access. Five men from Russia and Ukraine were recently charged in the biggest data breach in US history involving theft of over 160 credit card numbers from companies like Nasdaq and JC Penney, costing more than $300 million. Cyber security aims to establish rules to protect against internet attacks through measures like antivirus software, firewalls, and
1. Cybercrime involves criminal activities using computers and the internet, such as identity theft, hacking, and spreading viruses. Common types of cyber attacks include financial fraud, sabotage of networks, and theft of proprietary information.
2. Computer security, also known as cybersecurity, aims to protect computers, networks, programs, and data from theft or damage. It also aims to protect against disruption of computer services. Common computer security threats include hacking, computer viruses, and denial of service attacks.
3. Laws define cybercrimes and provide penalties for illegal computer access, damage to systems, and transmission of viruses. Cybersecurity professionals work to develop security technologies, processes, and practices to defend against cyberattacks and unauthorized
1. Cybercrime involves using computers or the internet to facilitate illegal activities such as identity theft, hacking, and financial fraud. The first recorded cybercrime took place in 1820.
2. Common types of cyber attacks include financial fraud, sabotage of networks or data, theft of proprietary information, unauthorized system access, and denial of service attacks. Hacking, pornography, viruses, and software piracy are also examples of cybercrimes.
3. Managing cybersecurity risks requires understanding threats like criminals and spies, vulnerabilities in systems and supply chains, and potential impacts such as data theft, service disruptions, and damage to infrastructure. Strong defenses, insider monitoring, and rapid patching are keys to risk reduction.
Crime has evolved with advances in technology. Cyber crime involves using computers or the internet to commit crimes like identity theft, hacking, or financial fraud. It can harm individuals, businesses, or society. There are many types of cyber crimes, including those against persons like stalking or defamation, against property like piracy or fraud, against organizations like hacking or denial of service attacks, and against society like terrorism or forgery. Defining and addressing cyber crime has become increasingly important as technology changes how crimes are committed.
This document discusses computer and cyber crimes. It defines computer crimes as illegal acts performed by hackers to steal private information from companies or individuals. Cyber crimes are crimes that involve computers and networks, where the computer may be used to enable criminal acts or be the target. Various types of cyber crimes are discussed such as cyber stalking, cyber pornography, intellectual property crimes, and computer vandalism. Computer forensics and tools for investigating cyber crimes are also mentioned.
1. The document discusses cybercrime, defining it as any illegal act involving computers, the internet, or networks. This includes both crimes against individuals like identity theft and cyberstalking as well as crimes against organizations like hacking and industrial espionage.
2. Several types of cybercrimes are described in detail, such as phishing, spamming, data diddling, and cyberdefamation. Cybercrimes can be committed across jurisdictions without physical presence.
3. Cybercriminals are classified into those seeking recognition, those not seeking recognition, and insiders. Cybercrimes are also classified based on the target - individuals, property, organizations, or society.
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
Cyber terrorism involves using computers and technology to intimidate or harm people for political or religious goals. It differs from physical terrorism in that there is less risk of being caught and tracked online. Potential cyber terrorists include crackers, white hat hackers, and script kiddies. Factors contributing to cyber terrorism are dependence on technology, lack of security understanding, lack funding for security, and difficulty tracking online criminals. Common cyber attacks include information theft, credit card theft, hacking, and threatening infrastructure. Preventing cyber terrorism requires cooperation between agencies, prioritizing security, and reporting cyber crimes.
Cyber terrorism involves using computers and technology to intimidate or harm people for political or religious goals. It differs from physical terrorism in that there is less risk of being caught and it is easier to carry out due to lack of security understanding. Potential reasons for cyber terrorist activities include information gathering, financial gain, hatred, or acting out of a sense of national pride. Common types of cyber terrorism attacks include information theft, credit card theft, hacking important systems, and threatening organizations. Combating cyber terrorism requires cooperation between agencies, prioritizing security, and reporting cyber crimes.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Body Corporates Beware: Defamation in Sectional Title SchemesAshwini Singh
Defamation in Body Corporates of Sectional Title Schemes (South Africa)
Examples of Slander in a Body Corporate:
- Unit Owner A makes a false statement that Unit Owner J is being sequestrated and foreclosed at an Annual General Meeting.
- Body Corporate Chairman O makes a false statement that a
registered Professional Land Surveyor has committed fraud at an Annual General Meeting.
Examples of Libel in a Body Corporate:
- Former Trustee A makes false statements via email (sent to multiple other owners) that Unit Owner J is illegally parking on common property, when Unit Owner J is parked within a registered Exclusive Use Area.
- Unit Owner A makes false statements via email (sent to multiple other owners) that accuse specific owners and occupants of creating network names that Unit Owner A finds offensive.
Case Law: Body Corporate of Sunnyside Gardens v Perreira
This presentation covers the fundamental principles of taxation law, focusing on the provisions within the Indian Constitution (Articles 264-289) that deal with finance, contracts, and property. It outlines the need for government finance, details the Income Tax Act of 1961, and discusses the distribution of revenues between the union and states. The presentation also delves into the structure of income tax, including its determination, exemptions, deductions, and the categorization of income. Additionally, it explores the residential status for tax purposes and distinguishes between capital and revenue receipts and expenditures.
Why Degree Certificate Attestation is Crucial for Immigration Processes.pdfandrewabshire123
Degree certificate attestation is the process of verifying the authenticity of a degree certificate by relevant authorities to ensure its validity for use in foreign countries for educational or employment purposes.
UILA - Red Cross Webinar Series - Criminal Law - ENG.pptxirishredcross1
Do you have questions about criminal law in Ireland?
Do you know what your rights are if you victim of a crime?
Do you want to know how criminal law works in Ireland?
Do you know where to go if you wish to report a crime?
Union Budget 2024 presented by Nirmala Sitharaman – LIVE.pdfTheBharatWeekly
The Union Budget 2024, presented by Finance Minister Nirmala Sitharaman on July 23, 2024, has garnered significant attention for its focus on infrastructure, income tax reforms, and economic growth. This budget aims to address various sectors, including railways, healthcare, education, and more, with a vision of making India a developed nation by 2047.
The case of Michel Moll, the internal policies of Sheriff Jim Arnott, and the 2023 ruling by the Missouri Supreme Court,
all demonstrate that we have reached a boiling point in the way state sex offender registration and notification laws are operating and being enforced. And everyone pays the price, when the house of justice is deaf, mute, and blind.
The Russian Spy Embedded in the World of Embedded FinanceVladislav Solodkiy
When Vladimir Putin launched his full-scale invasion of Ukraine in February 2022, the world responded with a swift and unprecedented wave of sanctions. Within months, the financial landscape for Russian companies, particularly those associated with oligarchs supporting Putin and his war, underwent a seismic shift. Access to foreign banking services, once taken for granted, became a scarce and highly sought-after commodity. The Wirecard scandal and the involvement of Jan Marsalek have highlighted stark differences in how Singapore and Russia, under Vladimir Putin's leadership, approach fintech and its potential use for money laundering and espionage. Catherine Belton's (FT, WSJ) book "Putin's People" provides numerous examples and insights into the behavior patterns of Putin-related oligarchs, especially the tendency to say one thing and do another (including the Wirecard-like scandal schemes). This duplicity is a recurring theme in the behavior of many Putin-era oligarchs, reflecting their background and strategies derived from KGB practices. Despite these settlements, both Fridman and Abramovich have been sanctioned by the US and UK for their connections to Putin and alleged support for his activities, including the invasion of Ukraine. This juxtaposition highlights the pattern of public denial and legal action against accusations while simultaneously being implicated by international authorities for their close ties to the Kremlin and support for Putin's regime. In many instances, Putin-related oligarchs would verbally justify actions like canceling deals using strategic reasons (such as ROFR?). However, their written communications would often cite absurd or unrelated reasons (such as "the inability to attract financing"?) without logically explaining how this related to their actual strategic maneuvers. This pattern of giving one explanation verbally and another in writing creates a veil of confusion and obscures their true intentions and actions. Belton's extensive research and interviews with key players reveal a consistent theme of manipulation and strategic deception, characteristic of the ex-Soviet oligarchs' approach to consolidating power and wealth under Putin's regime. These are just a few examples of the far-reaching consequences of the sanctions and the ongoing efforts to combat money laundering and financial crime associated with the Russian regime. The situation continues to evolve as governments and international organizations tighten the screws on those who seek to evade accountability and profit from war and corruption.
2. The number of Internet users is growing
So…..
CYBER CRIME is bound to RISE………..
3. yber
rime
A generic term that refers to all criminal activities done
using the medium of computers, the Internet, cyber space
and the worldwide web. It is very difficult to classify crimes
in general into distinct groups as many crimes evolve on a
daily basis.
CYBER SECURITY
Protecting information, equipment, devices computer, computer resource,
communication device and information stored therein from unauthorized access, use,
disclosure, disruption, modification or destruction.
5. HISTORY OF CYBER CRIME – FROM 1820 TO PRESENT
1820
1978
Employees committed acts of
sabotage to discourage a
textile manufacturer from further
use of the new technology
which allowed the repetition of
a series of steps in the weaving
of special fabrics .
First Spam Email sent
over the Arpanet
10. Cases Registered under the IT ACT
Tampering computer source documents (Section 65 IT Act)
Loss /damage to computer resource/utility (Section 66 (1) IT Act)
Hacking (Section 66 (2) IT Act)
Obscene publication/transmission in electronic form (Section 67 IT Act)
Failure of compliance/orders of Certifying Authority (Section 68 I T Act)
Failure to assist in decrypting the information intercepted by Govt Agency (Section 69 IT Act)
Un-authorised access/attempt to access to protected computer system (Section 70 IT Act)
Obtaining licence or Digital Signature Certificate by misrepresentation / suppression of fact
(Section 71 IT Act)
Publishing false Digital Signature Certificate (Section 73 IT Act)
Fraud Digital Signature Certificate (Section 74 IT Act)
Breach of confidentiality/privacy (Section 72 IT Act)
Others
13. CYBER CRIMES RECORDED IN 2018
KARNATAKA
The states of Andhra Pradesh (1207) and Telangana(1205)
along with Rajasthan(1104) are among the other states
which have recorded a high number of cyber-crime cases.
14. 6688 3076
2751
2704
Identity Theft Distribution of Sexually
Explicit Content
Offences other than
Ransomware under Sec 66
Cheating by Personation
MOST COMMON CYBER CRIMES
(INDIA - 2018)
15. • Cheating, Fraud, Cyber Stalking form
a majority of cyber-crimes booked
under IPC.
• 39% of the cases booked under
various section of IPC related to
‘Fraud(under section 420, 465, 468-
471)’ i.e. 3,353 cases across all the
states and UTs.
• Of these, a major portion are related
to ATM related frauds with 1284
cases. Bihar, Maharashtra and
Odisha are among the states with the
highest number of ATM related
frauds.
ATMs
Cases booked under various section of IPC related
to ‘Fraud(under section 420, 465, 468-471)’
309
1284
319
968
Credit/Debit
Card
Online Banking Fraud
OTP
17. HACKING
DENIAL OF SERVICE
ATTACK
TROJANS, WORMS &
VIRUSES
SOFTWARE
PIRACY
PORNOGRAPHY
CREDIT CARD
FRAUD
SPAMMING
PHISHING
SPOOFING
CYBER STALKING
CYBER
DEFAMATION
SALAMI ATTACK
DATA THEFT
IDENTITY THEFT EMAIL SPOOFING
TYPES OF CYBER CRIME
18. Variants of Cyber Crime
acking
A crime which entails cracking systems and gaining unauthorized
access to the data stored in them.
yber Squatting
Act of registering a famous Domain Name and then selling it for a
fortune. This is an issue that has not been tackled in IT ACT 2000.
19. Hacked Twitter handles of Rahul Gandhi, Vijay Mallya and the latest Barkha Dutt and
Ravish Kumar for NDTV.
They had tweeted a link to a partial data dump of about 1.2 GB emails of Barkha
Dutt.
The group claims it has a bypass for Twitter two-factor authentication to get access
to Twitter accounts.
Also bragged about having access to servers like Apollo Hospitals, but the group
was unsure about releasing data from those servers.
LEGION HACKERS
20. Prevention Against Hacking
Perform required software updates
Install a firewall on your computer
Change your passwords every month
Purchase or download antivirus software
Monitor network traffic
Restrict software installation
Use strong passwords
Do not share professional information on social networks
21. DATA THEFT
Data Theft is a growing problem, primarily perpetrated by office workers with
access to technology such as desktop computers and hand-held devices,
capable of storing digital information such as flash drives, iPods and even
digital cameras.
According to Information Technology (Amendment) Act, 2008,
crime of data theft under Section 43 (b) is stated as - If any
person without permission of the owner or any other person,
who is in charge of a computer, computer system of computer
network - downloads, copies or extracts any data, computer data
base or information from such computer or computer network
including information or data held or stored in any removable
storage medium, then it is data theft.
22. Anonymous India claims that Reliance Jio is sending this
data to companies in the US and Singapore and has also listed
a step-by-step guide for anyone to verify this themselves.
My Jio and Jio Dialer
apps send this
information to an ad
network called
Mad-Me.
Reliance Jio Still Sharing Your Call Information With Foreign Countries -
Anonymous India
23. VIRUS
WHAT IT IS?
A computer virus is a malware program that, when executed, replicates
by inserting copies of itself (possibly modified) into other computer
programs, data files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to be "infected".
TYPES
Resident vs
Non-resident
Virus
Macro Viruses
Boot-sector
Viruses
24. IDENTITY THEFT
Identity theft is a form of fraud or cheating of another person’s
identity in which someone pretends to be someone else by
assuming that person’s identity, typically in order to access
resources other benefits in that person’s name. Information
Technology (Amendment) Act, 2008, crime of identity theft under
Section 66-C, whoever, fraudulently or dishonestly make use of
the electronic signature, password or any other unique
identification feature of any other person known as identity theft.
Ways to steal identity: Data Breaching, Unsafe social media usage, Email hacks
According to the Norton report,
• Every four of 10 Indians have experienced identity theft
• 61% of participants feel they are protected against identify theft, but 63% didn't know
what to do after it.
25. Indian Banking: Biggest
data security Breach
• About 32 lakh ATM cards were hit
by cyber attack in October 2016.
• ATM cards of the customers were
blocked en-masse to avert financial
damage, but it raises serious
concerns over safety of online
banking in India.
Who is Responsible In Case of a
Banking Fraud?
“If anybody loses money online the end users are
liable for the loss not the banks, unless the user
proves to the bank that the fraud was ‘not’ a result
of negligence. Negligence means a user’s system
had malicious programme that stole credentials
or the user logged into an unsafe system. These
things are extremely difficult to prove. So,
ultimately it becomes a user problem. The banks
do not take responsibility. ”
Yash KS, Software Architect Qualys in an interview
26. • Phishing is just one of the many frauds on the Internet
trying to fool people into parting with their money.
• Phishing refers to the receipt of unsolicited emails by customers of financial institutions,
requesting them to enter their username, password or other personal information to access
their account for some reason.
• The fraudster then has access to the customer’s online bank account and to the funds
contained in that account.
27. Phishing involves fraudulently acquiring sensitive
information (e.g. passwords, credit card details etc)
by masquerading as a trusted entity.
31. • Use of the Internet or other electronic
means to stalk someone.
• Term interchangeably used with online
harassment and online abuse.
• Generally involves harassing or
threatening behavior that an individual
engages in repeatedly, such as following a
person, appearing at a person’s home or
place of business, making harassment
phone calls, leaving written messages or
objects, or vandalizing a person’s property.
Cyber Stalking
32. Vishing is the criminal practice of
using social engineering and
Voice over IP (VoIP) to gain
access to private personal and
financial information from the
public for the purpose of financial
reward. The term is a
combination of “Voice” and
phishing. Vishing exploits the
public’s trust in landline
telephone services.
Vishing is typically used to
steal credit card numbers or
other information used in
identity theft schemes from
individuals.
33. Pharming is a cyber attack intended to redirect a website's traffic to another,
fake site. Pharming can be conducted either by changing the hosts file on a
victim's computer or by exploitation of a vulnerability in DNS server software.
DNS servers are computers responsible for resolving Internet names into
their real IP addresses. Compromised DNS servers are sometimes referred to
as "poisoned".
35. 02
01
03
SPIM
Spim is spam sent via instant messaging (IM).
The IMs could include spyware, keyloggers,
viruses, and links to phishing sites.
KEYLOGGERS
A keylogger is a form of spyware
that records keystrokes as you
type. The information you type is
then saved to a file that the
hacker can access. If you are
surfing the web and visiting
banking and e-commerce sites, a
keylogger can potentially record
your account and password
information
SPYWARE
This is software that a hacker
surreptitiously installs on your
computer to collect personal
information, such as which
websites you visit. It can also be
used to direct you to fake
websites, change your settings,
and take control of your
computer in other ways.
36. Caller ID spoofing
Caller ID spoofing is the
practice of causing the
telephone network to display a
number on the recipient's caller
ID display which is not that of
the actual originating station.
Eg. www.crazycall.net
37. IP
SPOOFING
IP spoofing refers to the creation of Internet
Protocol (IP) packets with a forged source IP
address.
Purpose is concealing the identity of the
sender or impersonating another computing
system.
Routers use the destination IP address to
forward packets, but ignore the source IP
address.
The source IP address is used only by the
destination machine, when it responds back
to the source.
Goal is to flood the victim with overwhelming
amounts of traffic, and the attacker does not
care about receiving responses to the attack
packets.
38. IP
SPOOFING
Packets with spoofed addresses are
thus suitable for such attacks.
They have additional advantages for
this purpose—they are more difficult
to filter since each spoofed packet
appears to come from a different
address, and they hide the true
source of the attack.
41. Software piracy is theft of software through the
illegal copying of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original. Retail revenue
losses worldwide are ever increasing due to this
crime.
This can be done in various ways-
End user copying
Source: http://beebom.com/wp
content/uploads/2012/06/software-piracy.gif
Hard disk loading Counterfeiting
Illegal downloads from the internet etc.
Software piracy
42. crime
Internet Relay Chat (IRC) servers have chat
rooms in which people from anywhere the world
can come together and chat with each other.
Criminals use it for meeting coconspirators.
Hackers use it for discussing their exploits/
sharing the techniques. Pedophiles use chat
rooms to allure small children.
43. • Skimming is the theft of credit card information used in an otherwise
legitimate transaction.
• The thief can procure a victim's credit card number using basic methods such
as photocopying receipts or more advanced methods such as using a small
electronic device (skimmer) to swipe and store hundreds of victims’ credit
card numbers.
• Common scenarios for skimming are restaurants or bars where the skimmer
has possession of the victim's credit card out of their immediate view.
SKIMMING
44. Alice
Bob
Eve
I’m
Bob!
I’m
Alice!
1. Eve assumes a man-in-the-
middle position through some
mechanism. For example, Eve could
use router hacking etc...
2. Eve can monitor traffic between
Alice and Bob without altering the
packets or sequence numbers.
3. At any point, Eve can assume the
identity of either Bob or Alice
through the Spoofed IP address.
This breaks the pseudo connection
as Eve will start modifying the
sequence numbers
Man in the Middle Attack
45. Website Defacement
A website defacement is an
attack on a website that
changes the visual
appearance of the site or a
webpage.
Hackers break into a web
server and replace the
hosted website with one of
their own.
46. Sending unwanted commercial e-mail, advertising
for products, services, and Web sites.
Spam can also be used as a delivery mechanism for
malicious software and other cyber threats.
SPAMMING
How Much Does it Cost to Receive Spam?
• Spam uses a large amount of bandwidth. That cost is, of course, passed along to you either as a higher
Internet bill or as decreased performance at your ISP.
• Second, spam requires the attention of ISPs. They must attempt to filter it, respond to customer complaints
regarding spam, and otherwise devote time to spam that could be better spent improving customer service or
the technical quality of their ISP.
• Finally, probably the most significant cost of spam is the cost to the receiver dealing with it in terms of their
time.
47. Posting your email address on auctions, bulletin
boards, chat rooms, or advertising.
Businesses might sell your email address or other personal information
to a spammer (however, legitimate businesses do not do this).
Spammers can use software programs to collect email addresses from
web sites.
48. It is an attempt to make a computer resource unavailable to its intended users.
Denial of Service (DoS) Attack
• attempts to "flood" a network, thereby preventing legitimate network
traffic
• attempts to disrupt connections between two machines, thereby
preventing access to a service
• attempts to prevent a particular individual from accessing a service
49. • A network of remotely controlled
systems used to coordinate
attacks and distribute malware,
spam, and phishing scams.
• Bots (short for “robots”) are programs that are secretly installed on a targeted
system allowing an unauthorized user to remotely control the compromised
computer for a variety of malicious purposes.
Botnets
50. • Ping of Death attack involved sending
IP packets of a size greater than 65,535
bytes to the target computer.
• IP packets of this size are illegal, but
hackers can bypass this by cleverly
sending the packets in fragments.
When the fragments are assembled on
the receiving computer, the overall
packet size is too great. This will cause
a buffer overflow and crash the device.
PING OF DEATH
51. Teardrop Attack
Teardrop attacks target
vulnerability in the way
fragmented IP packets
are reassembled.
In the teardrop attack, the
attacker's IP puts a confusing
offset value in the second or
later fragment.
If the receiving operating
system does not have a
plan for this situation, it
can cause the system to
crash.
53. SQL Injection Attacks
• Attempts to pass SQL commands (statements) through a web application for execution by
the backend database.
• Through SQL Injection, the hacker may input specifically crafted SQL commands with the
intent of bypassing the login form barrier and seeing what lies behind it.
54. How to ensure Android Security?
Keep your device updated!
• The OEM (Original Equipment Manufacturer) of the
device usually sends OTA (over-the-air) updates
every month or once in two months which fixes the
current security patches.
Deny Permissions
• In Android 6.0 and above, you have the authority to
deny permission to apps.
• A web app and Android app to locate lost or
stolen device.
Android Device Manager
55. 500,000 Hacked Zoom Accounts Being Sold on
Dark Web
April 2020
Unprecedented level of growth in the past
month due to coronavirus
The sudden growth has led to several
privacy and security concerns surrounding
Zoom
More than 500,000 Zoom accounts are being offered for sale on the dark web and
hacker forums for 0.0020 cents each, and in some cases accounts are given away for
free.
As a result, Google, SpaceX, NASA, Standard Chartered, Siemens, all Taiwanese Government
Agencies and Australian Defence Force lost trust in the app and banned the use of Zoom App.
56. Europe’s Largest Private Hospital
Operator Fresenius Hit by Ransomware
Ranked 258th on the Forbes Global 2000
• The company provides products and services for dialysis, hospitals, and inpatient and
outpatient care, with nearly 40 percent of the market share for dialysis in the United States.
• This is worrisome because COVID-19 causes many patients to experience kidney failure,
which has led to a shortage of dialysis machines and supplies.
Apparent culprit - the Snake ransomware,
a relatively new strain first detailed earlier
this year that is being used to shake down
large businesses, holding their IT systems
and data hostage in exchange for payment
in a digital currency such as bitcoin.
57. Exposed data of 22 million users
Data Breach at
Unacademy
May 2020
Hackers kept user records for sale at $2,000
• Usernames and hashed passwords
• Date of joining, Last login date
• Account status
• email addresses, first and last names, and
other account profile details.
Compromised information included
58. Cybersecurity: Fighting a Threat That
Causes Billions of Damage
2014
$800M
2019
$3.5B
2025
(Expected)
$27B
*Atlas VPN Estimations
59. India – Ranked #3 among top 20 Cyber Crime Victims
(as per FBI Report, 2019)
Phishing and similar ploys,
personal data breach, romance
fraud and spoofing
(Most Common Internet Crimes)
27,248
Registered cases of
cyber crime
2901
Victims
(3rd Most Impacted
Country in the World)
60. &
C VID-19 CYBERTHREATS
Prolific and opportunistic criminals are taking advantage of the COVID-19 coronavirus pandemic to
launch a variety of cyberattacks.
Known malware which had been relatively dormant were re-detected since the outbreak began, taking
new forms or using COVID-19 to boost their social engineering tactics. These include:
Malicious domains : There has been an increase of domains registered with the keywords
‘COVID’ or ‘corona’ , to take advantage of the growing number of people searching for
information about COVID-19. Many of these are considered to be developed with malicious
intent – as of the end of March, 2,022 malicious and 40,261 high-risk newly registered domains
were discovered, according to Palo Alto Networks.
61. &
C VID-19 CYBERTHREATS
Data-harvesting malware : Data-harvesting malware such as Remote Access Trojan, info
stealers, spyware and banking Trojans infiltrate systems, using COVID-19 related information
as a lure to compromise networks, steal data, divert money and build botnets.
Online scams and phishing : Cybercriminals are creating fake websites related to COVID-
19 to entice victims into opening malicious attachments or clicking phishing links, resulting in
identity impersonation or illegal access to personal accounts. Also, Trend Micro reported that
nearly one million spam messages have linked to COVID-19 since January 2020.
62. &
C VID-19 CYBERTHREATS
Vulnerability of working from home : Threat actors are exploiting vulnerabilities of
systems, networks, and applications used by businesses, governments and schools to
support staff who are now working remotely. As the growing number of people relying on
online tools overburdens the security measures put in place prior to the virus outbreak,
offenders search for more chances of exposure to steal data, make a profit or cause
disruption
Disruptive malware (ransomware and DDoS): Cybercriminals are deploying disruptive
malware like ransomware against critical infrastructure and response institutions such as
hospitals and medical centres, which are overwhelmed with the health crisis. Such
ransomware or DDoS attacks do not typically aim to steal information, but prevent it from
accessing critical data or disrupt the system, exacerbating an already dire situation in the
physical world.
63. EXPECTED FUTURE DEVELOPMENTS
Online scams, phishing and BEC will surge due to the economic downturn
and shift in business landscape, generating new criminal activities.
Threat actors will target individuals’ personal information through the
spoofing and exploitation of digital content providers.
Governments, businesses and schools will come to rely on online
connectivity and virtual communications tools as employees continue to
work from home, increasing their vulnerabilities and presenting more
opportunities for cybercriminals to exploit.
Criminals will take advantage of the underground market to look for
‘cybercrime-as-a-service’ given the ease of access and low cost.
66. COMPUTER FORENSICS
Branch of digital forensic science pertaining to legal evidence found in computers and
digital storage media. The goal of computer forensics is to examine digital media in a
forensically sound manner with the aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions about the digital information.
67. Role of computer forensics professional: gather evidence to prove a suspect
committed a crime or violated a company policy
Investigate the
suspect’s computer
Preserve the evidence
on a different computer
Recovering the
evidences
Analyzing the
evidences
Collect evidence that can be offered in court or at a corporate inquiry
Preparing a Computer Investigation
68. Preparing a Computer Investigation
Cross-drive analysis
A forensic technique that correlates information found on multiple hard drives. The
process can be used to identify social networks and to perform anomaly detection.
Live analysis
The examination of computers from within the operating system using custom forensics
or existing sysadmin tools to extract evidence. Eg.The logical hard drive volume may be
imaged (known as a live acquisition) before the computer is shut down.
Deleted files
A common technique used in computer forensics is the recovery of deleted files. Modern
forensic software have their own tools for recovering or carving out deleted data.
Steganography
One of the techniques used to hide data is via steganography, the process of hiding data
inside of a picture or digital image. Computer forensics professionals can fight this by
looking at the hash of the file and comparing it to the original image (if available.) While
the image appears exactly the same, the hash changes as the data changes.
73. Sections Relevant in IT Act, 2000 and
Amendments
Cyber Attacks/Crime Brief Description
Cyber Stalking Stealthily following a person, 43, 66
tracking his internet chats. (Compensation and punishment of
three years with fine)
Intellectual Property Crime Source Code Tampering etc. 43, 65, 66
(Compensation and punishment of
three years with fine)
Salami Attack Deducting small amounts from an 43, 66
(Theft of data or account without coming in to (Compensation and punishment of
manipulating banking account) notice, to make big amount three years)
E-Mail Bombing Flooding an E-mail box with 43, 66
innumerable number of E-mails, to (Compensation and punishment of
disable to notice important three years)
message at times.
Phishing Bank Financial Frauds in Electronic 43, 66, 66C
Banking (Compensation and punishment of
three years with fine)
Personal Data Theft Stealing personal data 43, 43A, 72A
(Compensation and punishment of
three years with fine)
74. Identity Theft Stealing Cyberspace identity 43
information of individual (Compensation and punishment of
three years with fine)
Spoofing Stealing Credentials using, friendly 43, 66
and familiar GUI’s (Compensation and punishment of
three years with fine)
Data Theft Stealing Data Provisions under 43, 43A, 65,66
and 72
(Compensation and punishment of
three years with fine)
Worms Trojan Horses, Virus Different Hacking mechanisms 43, 66
etc. (Compensation and punishment of
three years with fine)
Sabotage of Computer Taking control of computer with 43, 66
the help of malware. (Compensation and punishment of
three years with fine)
DOS, DDOS Demat of Service Flooding a computer with Denial of 43, 66, 66F
Service Attacks, DDOS is (Compensation (up to life
Distributed DOS attack imprisonment under 66F)
Web Defacing Web Pages Defacing 43, 66
(Compensation and punishment of
three years with fine)
Logic Bomb Attack triggers on an event 43, 66
(Compensation and punishment of
three years with fine)
ATM fraud/EDI Financial fraud in ATM and e- 43, 66
75. To strengthen the cybersecurity ecosystem in India, the Indian government has
launched following initiatives:
• Cyber Surakshit Bharat initiative
• Cyber Swachhta Kendra
• National Cyber Crime Reporting Portal
• National Critical Information Infrastructure Protection Centre
77. To spread awareness,
build capacity as well as
enable government
departments on steps that
need to be taken to create a
Cyber Resilient IT setup.
79. To protect critical information of our country, which has an enormous impact
on national security, economic growth, or public healthcare.