Вы находитесь на странице: 1из 24

Cyber crimes & Countering Procedures

Presented by Krishna Chaitanya Suraparaju

Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

Why learn about Cyber Crimes?


Because
Everybody is using Computers New generation is growing up with computers
From teenagers to adults From White collar criminals to terrorist organizations

Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers MOST IMPORTANT-Monetary transactions are moving on to the INTERNET
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

Infrastructure Protection: A New Threat Paradigm


Cyberspace: the Infrastructure behind Critical Infrastructure
Manufacturing Food & Agriculture Chemicals and Hazardous Materials Defense Industry Public Health

The New Threat: Anyone with a Computer


Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

Attack Sophistication vs. Intruder Technical Knowledge


Attack Sophistication Intruder Knowledge

Tools

Imminent Attacks

stealth / advanced scanning techniques packet spoofing sniffers sweepers DoS Hacktivism www attacks automated probes/scans

High

back doors disabling audits

GUI
network mgmt. diagnostics

hijacking burglaries sessions exploiting known vulnerabilities password cracking self-replicating code password guessing

Low
1980

Attackers
1995 2000 2010 2020

1985

1990

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

What is Cyber Crime?


Computer crime or cybercrime or Hitech crime is a form of crime where the Internet or computers are used as a medium to commit crime. Computer is tool of the crime Computer is target of the crime Computer is incidental to crime
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

Types of Cyber Crimes


Cyber Crime refers to all activities done with criminal intent in cyberspace. These fall into three categories:
Crimes against Government Against Business and Non-business organizations Against Individuals

Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

International Cyber Crime


International cyber crime is broken down into 6 legal areas:
1. Computer Fraud (Nigerian scam, lottery scams) 2. Computer Forgery (Email theft, ID theft, Credit card frauds) 3. Damage to Computer data or Computer Program (Virus, Worms, ransom ware) 4. Computer Sabotage (Firmware attacks) 5. Unauthorized Access (Hacking) 6. Unauthorized Interception (Sniffing)
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

E-Mail spoofing

A spoofed email is one that appears to originate from one source but actually has been sent from another source. This can also be termed as E-Mail forging.

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

Cyber Pornography

This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.)

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

Sale of illegal articles

This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications.

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

10

Online gambling

There are millions of websites, all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

11

Financial Claims & Intellectual Property Crimes


Financial Claims: This would include cheating, credit card frauds, money laundering etc. Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations etc.

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

12

Cyber Defamation

This occurs when defamation takes place with the help of computers and or the Internet e.g. some one published defamatory matter about someone on a websites or sends e-mail containing defamatory information to all of that persons friends.
Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved. 13

Cyber Stalking

Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim , entering the chatrooms frequented by the victim .

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

14

Unauthorized access to computer system or network

This activity is commonly referred to as hacking. The Indian Law has however given a different connotation to the term hacking.

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

15

Other attacks:
Theft of in formation contained in electronic from: This includes information stored in computer hard disks, removable storage media etc. E-Mail bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in the victims e-mail account or mail servers. Data diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

16

Other attacks:
Salami attacks: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into banks servers, that deducts a small amount from the account of every customer. Denial of Service: This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources.
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

17

Other attacks:
Virus/worm: Viruses are programs that attach them selves to a computer or a file and then circulate them selves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses don not need the host to attach them selves to. Logic bombs: These are dependent programs. This implies that these programs are created to do some thing only when a certain event occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date.
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

18

Other attacks:
Trojan Horse: A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seem s to be an authorized program , thereby concealing what it is actually doing. Internet Time Theft: This connotes the usage by unauthorized persons of the Internet hours paid for by another person. Physically damaging a computer system: This crime is committed by physically damaging a computer or its peripherals.
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

19

Cyber Law
India has enacted the first I.T. Act, 2000. Offence categorization table is as follows:
Offence Tampering with Computer source documents Hacking with Computer systems, Data alteration Publishing obscene information Section under IT Act Sec.65 Sec.66 Sec.67

Un-authorised access to protected system Breach of Confidentiality and Privacy


Publishing false digital signature certificates

Sec.70 Sec.72
Sec.73

Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

20

Cyber Law
Computer Related Crimes Covered under IPC and Special Laws
Offence Sending threatening messages by email Sending defamatory messages by email Section Sec. 503 IPC Sec. 499 IPC

Forgery of electronic records


Bogus websites, cyber frauds Email spoofing Web-Jacking E-Mail Abuse Online sale of Drugs Online sale of Arms
Proprietary and Confidential. 2012 CYCOPS. All Rights Reserved.

Sec. 463 IPC


Sec. 420 IPC Sec. 463 IPC Sec. 383 IPC Sec. 500 IPC NDPS Act Arms Act
21

Potential Cyber Attacks

Unauthorized Intrusions Website Defacements Domain Name Server Attacks Distributed Denial of Service (DDoS) Attacks Computer Worms Routing Operations Critical Infrastructures Compound Attacks
Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

Potential Sources of Attacks

1. 2. 3. 4.

Thrill Seekers Disgruntled Employees Organized Crime Terrorist Sympathizers and Anti-U.S. Hackers 5. Terrorist Groups 6. Nation-States

Proprietary and Confidential. 2010 CYCOPS. All Rights Reserved.

Questions?

Proprietary Inc. Confidential. GoSecureand All Rights Reserved. 2012 CYCOPS.

24

Вам также может понравиться