0% found this document useful (0 votes)
20 views

Cyber Crime

The document discusses various types of cyber crimes such as hacking, eavesdropping, phishing/fraud emails, and ransomware. It provides details on how each crime is committed and examples. Hacking involves unauthorized access to computer systems for illicit purposes. Eavesdropping secretly intercepts digital communications. Phishing scams users into revealing sensitive data or installing malware through deception. Ransomware encrypts user files and demands payment for decryption. The document advises on preventing cyber crimes by keeping systems updated, using security software/strong passwords, avoiding suspicious links/emails, and not sharing personal details online without ensuring security.

Uploaded by

8212yuvraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Cyber Crime

The document discusses various types of cyber crimes such as hacking, eavesdropping, phishing/fraud emails, and ransomware. It provides details on how each crime is committed and examples. Hacking involves unauthorized access to computer systems for illicit purposes. Eavesdropping secretly intercepts digital communications. Phishing scams users into revealing sensitive data or installing malware through deception. Ransomware encrypts user files and demands payment for decryption. The document advises on preventing cyber crimes by keeping systems updated, using security software/strong passwords, avoiding suspicious links/emails, and not sharing personal details online without ensuring security.

Uploaded by

8212yuvraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CONTENTS

➢ What is Cyber Crime ?

➢ Hacking

➢ Eavesdropping

➢ Phishing and Fraud Emails

➢ Ransomware

➢ Preventing Cyber Crimes


WHAT IS
CYBER
CRIME ?
➢ The internet has grown rapidly and still expands.
It has given rise to new opportunities in every
field we can think of be it entertainment, business,
sports or education. But there are always two sides
to a coin. Internet also has its own disadvantages.

➢ Crime has always been unpleasant and


unavoidable ingredient in our society. And now as
computers and internet have dominated the
society due to the dependence in matters of
communication, banking, finance, examination
and many other.

➢ They have become virtual lockers storing all our


information and secrets. And as it is essential and
important in our lives, crime cannot spare it too.

➢ Cyber Crime is a term used to broadly describe


criminal activity in which computers or computer
networks are a tool, a target, or a place of criminal
activity and include everything from electronic
cracking to denial of service attacks.

➢ Computer crimes mainly consists of unauthorised


access to computer system data alteration, data
destruction, theft of intellectual property. Cyber
crime in the context of national security may
involve hacking, traditional espionage, or
information warfare and related activities.

➢ Threatening emails, defamation, spam, are some


examples where computers are used to commit
crime, whereas viruses, worms, hacking are some
examples where computers become target of the
crime.
Hacking
➢ Hacking is an attempt to
exploit a computer system
or a private network inside a computer. Simply
put, it is the unauthorised access to or control over
computer network security systems for some illicit
purpose.

➢ To better describe hacking, one needs to first


understand hackers. One can easily assume them
to be intelligent and highly skilled in computers.
In fact, breaking a security system requires more
intelligence and expertise than actually creating
one. There are no hard and fast rules whereby we
can categorize hackers into neat compartments.
However, in general computer parlance, we call
them white hats, black hats and grey hats.

➢ White hat professionals hack to check their own


security systems to make it more hack-proof.
Black hat hackers hack to take control over the
system for personal gains. Grey hat hackers
comprise curious people who have just about
enough computer language skills to enable them
to hack a system to locate potential loopholes in
the network security system. All kinds of hacking
are considered illegal barring the work done by
white hat hackers.
Eavesdropping
➢ Eavesdropping as we know it, is the act of secretly
listening to a conversation, private or otherwise,
of which we are not actively a part. In computer
security, the definition carries the same meaning
in digital terms. Eavesdropping in computer
security is defined as the unauthorized
interception of a conversation, communication or
digital transmission in real time. The various
forms of communication include phone calls,
emails, instant messages or any other internet
service.

➢ The activities of eavesdropping normally do not


cause disruptions on the normal operation of the
systems being eavesdropped on. In reality, if one is
eavesdropping on a conversation you hardly want
there to be any form of disruption that can cause
that conversation to cease. As such both parties of
the communication - the sender and receiver - are
completely unaware that their communication is
being intercepted and data is being stolen.
Phishing and Fraud
Emails
• Phishing
➢ Phishing is a form of social
engineering and scam where attackers deceive
people into revealing sensitive information or
installing malware such as ransomware.

➢ Phishing attacks have become increasingly


sophisticated and often
transparently mirror the
site being targeted,
allowing the attacker to
observe everything while
the victim is navigating
the site, and transverse
any additional security boundaries with the victim.

➢ Measures to prevent or reduce the impact of


phishing attacks include legeslation, user
education, public awareness, and technical
security measures. The importance of phishing
awareness has increased in both personal and
professional settings, with phishing attacks among
businesses rising from 72% to 86% from 2017 to
2020.

• Fraud Emails

➢ Email fraud refers to a variety of scams and


malicious activities that are carried out
through email. These attacks can range from
simple advance-fee scams targeting unsuspecting
individuals, to sophisticated business email
compromise (BEC) attacks that aim to trick large
accounting departments into paying fraudulent
invoices. Email fraud attackers often use social
engineering tactics, such as posing as a trusted
authority figure or using urgent or emotionally
charged language, to manipulate their victims into
taking action detrimental to themselves or their
organization.

➢ There are many examples of email fraud, but one


of the most notorious examples is the advanced fee
scam or the “Foreign Prince” email. In this scam,
an individual posing as a wealthy prince promises
to transfer a large sum of money to the victim’s
account in exchange for a small upfront payment
or transfer fee. Once the payment is made, the
promised funds never materialize
Ransomware
➢ Ransomware is a type
of cryptovirological malware that permanently
block access to the victim's personal data unless a
ransom is paid. While some simple ransomware
may lock the system without damaging any files,
more advanced malware uses a technique called
cryptoviral extortion.

➢ It encrypts the victim's files, making them


inaccessible, and demands a ransom payment to
decrypt them. In a properly implemented
cryptoviral extortion attack, recovering the files
without the decryption key is
an intractable problem, and difficult-to-
trace digital currencies such
as ‘paysafecard’ or ‘Bitcoin’ and
other cryptocurrencies are used for the ransoms,
making tracing and prosecuting the perpetrators
difficult.

➢ Ransomware attacks are typically carried out


using a Trojan disguised as a legitimate file that
the user is tricked into downloading or opening
when it arrives as an email attachment.

➢ WannaCry, an encrypting ransomware computer


worm, was initially released on 12 May 2017. The
ransom demand ranged from $300 to $600 to be
paid in the cryptocurrency Bitcoin. WannaCry
ransomware is also known as WannaCrypt,
WCry, Wana Decrypt0r 2.0, WannaCrypt0r 2.0
and Wanna Decryptor.

➢ It targets computers running outdated versions of


the Microsoft Windows operating systems by
exploiting the EternalBlue vulnerability in the
Server Message Block (SMB) protocol. This
allowed the ransomware to spread without victim
participation.
Preventing Cyber
Crimes
1.Ensure your system is up-to-date. Generally,
cybercriminals are aware of the flaws or loopholes to
enter in your system. Therefore, fixing those exploits
by updating system is crucial.
2.Use full service internet security suite. Considering
reliable security software is a prudent approach, as it
offers comprehensive protection for your devices,
online privacy, and identity.
3.Use strong password. A combination of letters,
numbers, and symbols will make a strong password.
4.When a pop-up or a spam email appears in your
window and asks you to share your username or
password, never fall for that trap.
5.Use anti-virus/malware software to prevent viruses
from infecting your computer by installing and
regularly update your anti-virus.
6.Do not click on untrusted websites or links.
7.Never give out personal data over the phone or via
email unless you are completely sure the line or email
is secure. Make certain that you are speaking to the
person you think you are.
Thank
You

You might also like