Академический Документы
Профессиональный Документы
Культура Документы
Introduction
Technology is “double edge sword” ( Good/bad)
Fast exchange of information. (Good)
Easy down the work . (Good )
Threats of interception. (Bad)
Technology use for criminal activities. (Bad)
Cybercriminal use the World Wide Web and Internet in optimal
to transfer and store information. ( Smart use of resources )
Cybercriminal are taking advantage about lack of awareness
about cybercrimes and cyber laws. ( Cyber Threats ).
Attacker exploit the network vulnerability.
Hackers- Person with a strong interest in computers
who enjoys learning and experimenting with them.
Brute force hacking- It is a technique used to find
passwords or encryption keys. It involves trying every
possible combination of letters, numbers, etc.until the
code is broken.
Cracker- A Cracker is a person who breaks into
computers.
Cracking- It is the act of breaking into computers.
Cracking tools- These are programs used to break
into computers.
Phreaking- This is the notorious art of breaking into
phone or other communication systems.
Network Vulnerabilities
Inadequate border protection(Network periphery)
Remote access servers(RASs) with weak access controls
Application servers with well known expolits
Misconfigured systems and system with the default
configurations.
Categories of Cybercrime
The target of the Crime
Whether the crime occurs as a single event or as a
series of events.
Categories of cybercrime
Crime targeted at individuals.
- exploit human weakness such as greedy nature.
- financial fraud.
- copyright violation
- Harassment
Crime targeted at property.
- stealing of Smartphone, Laptop, Tab, Ext HD, pendrive
2. Computer Based.
Social Engineering
Human –Based social engineering.
Person to person interaction to get desired information
- Impersonating an employee or valid user. (organization
having various branch)
-Projecting an important member of the organization.
(CEO/Manager)
- Using third person : An attacker pretends to have
permission from authorized user to access the system.
- Calling technical support .(Technical Support staff )
- Shoulder surfing (login id/password)
- Dumpster Driving
Social Engineering
Computer Based Social Engineering.
- sensitive or confidential information is collected by using computer
/Internet.
1. Fake E-mail : Attacker sends fake email to no of user victim find it
legitimate mail.
2. E-mail Attachment. (malicious code is attached )
3. Pop up windows. – special offers.
4 . Dumpster Driving
Cyberstalking
Stalking means “act or process of following victim silently”
Types of stalking
1. Online stalking : They interact with victim directly with the help
of Internet.
Mode of Interaction : E-mail, chat room
Stalker can make use of third party to harass victim.
2. offline stalker : Stalker may attack on victim by observing his
1. Daily routing.
2. searching personal website /blogs
3. Visiting victim organization.
Case Report on cyberstalking
Majority of cyberstalking women are victim .
Few cases are reported where women are cyberstalking and men
are victim.
How stalking works ?
- Gathering personal info .( sp . Contact no and address)
- Established contact with victim through tel./cell phone.
- Contact via E-mail.
- Continues threaten mail to victim.
- The stalker may post victim personal photo and information
social site/ defamation.
- Subscribe/register victim’s e-mail accounts for some spam
subscription.
Cybercafe and Cybercrime
Keyloggers
Shoulder surfing
DDoS Attack , Spam Attack ,Malware and Adware Installation Stealing confidential
information Phishing Attack ,Spamdexing { search engine poisoning } (It is the
deliberate manipulation of search engine indexes.)