“Criminal activity done using computer and internet
What are the characteristics of cyber crime
Unlawful functions.
Computer used – a tool or – a target or – both as a target or – the equipment is used.
Goal – attack/attacked to steal other assets.
There is no major difference in traditional crime versus cyber crime. The only difference is the medium through which crime is committed. To achieve access to knives and weapons vs. port scanners, viruses and worm groups or individuals. The intention is to embezzle money or any valuable thing. The physical presence of a criminal at the crime site is not necessary.
What are the threats of cyber crime
Reputation and damage to morale
Theft of identifyable information
IP theft including data theft
Disruption
Financial loss
Regulatory Risk
Cost of Damage and Damage Control
The objectives of cyber crime and the desire to reach the prohibition of greed strength, the promotion of greed power, a destructive mindset to reach the prohibited information
Aspects of technology that makes cyber crime an easy option. Comparison in small places in small places storage data easy access to the easiest access system.
Types of cyber criminals traditional criminals and thieves hackers and computer trace passer, password hacker malicious code writer and distributor music, film and software pirate harassment and forcibly recovering, ethnic criminals and other cyber sexual criminals, educational deceptive ethnic -based gangs, organized criminals, government and independent spy -terrorist
How Cyber Criminals work very professional and organized, not spontaneous – ground work required, coders, children, drops, crowds
Classification of cyber crimes
Crime against individual
Email is the creation of email messages by copying the identity of the spoofing mail correspondent. This shows that it is actually different from the place where it originates.
E-mail spam is a message also known as junk mail; Send with a web link or business offer. Clicking on this link or answering the commercial proposal sent to the fishing website or set up malware in your workstation.
Crime against individual cyber defamation
The task of accusing a person, whose aim is to underestimate or ignore it or ignore it or to make him a character of hatred, disrespect or ridicule. Cyber Stocking: Stocking means “chasing secretly” to keep an eye on a person’s activities on the Internet, posting messages (sometimes threatened) on the bulletin board often seen by the victim, entering the chat-room seen by the victim, constantly attacking the victim with frequent emails, etc.
Crime against property
Credit card fraud: Online fraud and frauds are the highest amount of money that is growing in cyber sector nowadays.
Intellectual Property Crime: Crime against property
Internet time theft comes under internet time theft. This is the use of internet hours paid by another person by an informal person. Any illegal work that the owner is completely or partially denied by his human rights is a crime. Very common forms of IPR misuse – software theft, copyright violations, trademarks and service mark violations, theft of computer source code, etc.
Crime against property
Internet time theft: Internet time theft comes under hacking. This is the use of internet hours paid by another person by an informal person.
Crime against organization
Unauthorized access: It is usually represented as ‘hacking’.
Service rejected attack: Service rejection refers to the act by which user refuses to use service or website of service. Criminals target web servers of websites and send a large number of requests to that server. The maximum bandwidth of the website is used, and it slows down or not available for some time.
Virus attack: Computer virus is a type of malware, which, when executed, creates replication by implanting themselves in other computer programs, data files or boot sectors of other computer programs, data files or hard drives.
Email bombing: In email bombing, a user sends a large number of emails to the target address and causes that email address or mail server crashes.
Salute attack: When small attacks together become a major attack, which is not detected due to its nature. It is also called salute slicing.
Logic bomb: A piece of code intentionally inserted into a software system that will initiate mischievous features under certain circumstances.
Trojan Horse: Non-welf-duplicate types of malware program that involves malicious code, which when implemented performs actions determined by the nature of Trojan, which usually causes data damage or theft, and possibly damage the system.
Data Didling: Data is an illegal amendment of Diding data. He can be a victim of data deedal when a person records some data in his system and is different from output input. This is performed by a virus program that changes the data recorded.
Crime against society
Cyber terrorism: Difference between cyber terrorism and cyber crime. Both are criminal acts. (1) to fear the public or any section of the public; Or (2) adversely affect harmony between various religious, racial, linguistic or regional groups or castes or communities; Or (3) to pressurize or control the government established by law; Or (4) To endanger the sovereignty and integrity of the nation.
Web Jacking: The word ‘web jacking’ comes from kidnapping. In this type of cyber crime, cyber criminals hack the control of a website. They may be able to change the content of that website. They use that website as the owner and the real owner of the website has no control over the website. Sometimes the attackers ask for ransom from the owner of the website.
Types of Cyber Crime
Financial Crime
Finance and Fraud
Information Stolen
Cybercrhassment Recovery
Drug Smuggling
Weapons and illegal goods/activities
Cyber pursuing
Cyber pursuit
Dissemination of vulgar or objectionable materials
Defamation
Cyber Terrorism
Cyber Terrorism
Cyber Terrorism
Refusal of Cyber War
Refusing Services
Cyber Crime Techniques
Dampster Diving – Treasury in Garbage
Wire Tapping – Insmanit Network Insmanit
Listening on Emissions – Listening on Emissions – Listening to Signal Removal
Refusal to Service Harassment
Software Theft
Session Kidnapping
Risk Management
Recruitment of Risk Management
Identification of important information assets, assessing risks, dangers and weaknesses faced by these assets, estimating the impact of these risks and the process of initiating the retaliation
Safety Control
Safety Control
Safety Controls specified, design, implemented and maintain
Safety Management Infrastructure – ISO/IEC 27002 What does “what does”:
Preventive Control
System Control
Frequency Control
Corrective Control: Control “What is”
Physical Control
Technical Control
Technical Control
Administrative Control
Preventive Control
Physical Control – Backup Files, Security Guard, Fence, Baige Systems, Double Door Systems, Locks and Chhabis, Fire Fire Equipment
Technical Control – Access Control Software, Antivirus Software, Password, Smart Card
Administrative Control – Safety Control – Safety Awareness and Technical Training, Slocation of Duties, Supervision of Duties
Steering Control
Physical Control- CCTV
Technical Control- Infiltration Local Rencing
Corrective Control
Physical Control- CCTV
Technical Control- All systems are filled with anti-virus software systems
Administrative Control- Action on Safety Audit Conclusions
Other Control
Preventive Control – Security Guard with Gun, Torn Wire Fence, Penal Policy
Recovery Control – Backup for System
Backup for System
Compensation Control – When General Control Fails – Log Report Review, Administrator’s activities review