combating cyber crime
TRANSCRIPT
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 1/37
Combating Cyber Crime
Presentation by : Priyanka Tomar
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 3/37
PREREQUISITES Computer Hardware
Computer Software
Internet Surfing Email
Networking
IP Address
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 4/37
Combating Cyber Crime Cyber + Security
What is Security
What is Cyber Security
involves detection, prevention and responding to attacks
Why do we need Cyber Security –Phishing, Credit Card Frauds
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 5/37
Combating Cyber Crime Who is Vulnerable –e.g. screen hack
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 6/37
Cyber Security Threats Virus
Worm
Trojan Horse Remote Administration Tool – Prorat, Poison Ivy
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 7/37
Cyber Security Threats-RATThe operator controls the RAT through a network connection. RAT
provide an operator the following capabilities:
Screen/camera control.
File management (download/upload/execute etc. Shell control (from command prompt).
Computer control (power off/on/log off).
Registry management (query/add/delete/modify).
Start, stop and restart Windows services.
Copy/delete files and format disks.
View and clear the windows event logs.
Other software product-specific functions.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 8/37
Cyber Security Threats Hackers
Identity Thieves
Spyware/Adware Website advertisements
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 9/37
Consequences of Inaction Loss of access
Loss of confidentiality, integrity and public trust
Lawsuits, Disciplinary action
The US has charged six members of an internationalcybercrime gang that hacked into user accounts to defraudeBay's Stubhub ticket reselling website of about $1m.
The men were arrested in the UK, Canada and Spain inconnection with the scam in which more than 1,600StubHub users had their credit cards used to buy tickets,
which were then sold on by the criminals.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 10/37
Preventive Measures -I OS/Software Updates
Anti virus
Personal Firewalls Check Open Ports -http://www.auditmypc.com/firewall-test.asp
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 11/37
How to block Ports Block Ports
Control Panel>System and Security> Windows Firewall
Advanced Settings See inbound and outbound rules
Create your own rule
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 16/37
How to know if there is spyware?
Endless pop-up windows.
Redirected to other websites automatically.
Random Windows error messages . Computer suddenly seems slow.
New and unexpected toolbars appear in web browser.
New and unexpected icons appear in the task tray.
Browser's home page suddenly changed.
Search engine your browser opens has been changed.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 17/37
Don't click on links within pop-up windows
Be careful while installing free software , never forgetto read user agreement.
Block pop-up windows and cookies by adjustingbrowser preferences.
Be aware of unexpected dialog boxes asking -Do you
want to run a xxxx program . Always select "no" or"cancel," or close the dialog box.
Prevent Spyware Installation
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 18/37
Remove Spyware Spyware copies several files to different directories and
changes the registry. Use a spyware remover - aprogram dedicated to removal of sypware.
Run a legitimate product to remove spyware e.g Ad-Aware, Microsoft Window Defender, Webroot'sSpySweeper etc.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 19/37
Preventive Measures-II Prevent Identity Theft-Beware of phishing scams - a form of fraud that uses
email messages that appear to be from a reputable business (often a financial institution)in an attempt to gain personal/ financial account information. These often do notinclude a personal salutation. Never enter personal information into an online form you
accessed via a link in an email you were not expecting. Legitimate businesses will not askfor personal information online.
Intrusion Detection Software/Device
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 20/37
PhishingGoogle Security Team to Sunitha
Verification Required.
Dear Gmail User,
The Gmail infrastructure is going through an annual security and performance overhaul. In the same respect, youare requested to verify your account by clicking on the following link. The Google Security Team is available toprovide you all the assistance for secure communication over the Internet. Happy surfing!
accountverification.gmail.com/src/verify.php?confirmation=dhPGcsiuUNdnAoN77q5CHwCgl4MmCAXE72d
You are requested to act on this immediately to guarantee the smooth functioning of your mail account.
Thanks, Account Security AdministratorGoogle Security Team
Google, Inc. Phone: +1 650-253-0000
You are receiving this message from Google because you are a valued member. Google respects your privacy. Tolearn more, please read our online Privacy Statement. For more information or for general questions regarding
your e-mail account, please visit Gmail Help.
Google Inc, 1600 Amphitheatre Parkway, Mountain View, CA 94043. All rights reserved.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 21/37
Phishing WebsiteSee URL inaddress bar
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 22/37
Preventive Measures Protect Passwords
Regular Backup
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 23/37
Preventive Measures -II Setup Cyber Security Policies
Email Virus Filtering Services
Firewall Services Email attachment Filtering
Vulnerability Scanning
Intrusion Prevention System
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 24/37
Be aware while using gmail Alternate email
Last account activity
Settings> Chat Settings>Accounts and Import > Account Settings
> Other Accounts Settings>Security
>Other Accounts Settings>
Settings> Accounts and Import > Grant access to your account –can add other gmail
Mark conversation as read when opened by others
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 25/37
Be aware while using gmail cont:: Set Alerts-
https://www.google.com/settings/security?hl=en
Filter/Block emails
Add Forwarding Address: You can have your emailsautomatically forwarded to another address.
Be Alert!!!!!!!
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 27/37
Intrusion Detection Used to monitor for “suspicious activity” on a network
Can protect against known software exploits, like bufferoverflows
Open Source IDS: Snort
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 28/37
Hackers Black
Grey
White
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 29/37
Google Hacking Google hacking is a computer hacking technique that
uses Google Search and other Google applications tofind security holes in the configuration and computer
code that websites use.
The following search query will locate all websites thathave the words "admbook" and "version" in the title ofthe website. It also checks to ensure that the web pagebeing accessed is a PHP file.
intitle:admbook intitle:version filetype:php
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 30/37
Email Encryption Email encryption is authentication, of email
messages, to protect the content from being read byany but the intended recipients. Email encryption has
been used by journalists and regular users to protectprivacy.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 31/37
Email Encryption Cont Your public key is the part of the encryption that you
make public. Your private key is the part of theencryption that you never share with anyone under
any circumstance.The two keys work together so that you need both todecrypt anything.
Get GPG installed on our operating system. It is availableat http://www.gnupg.org/download/
Mozilla Thunderbird
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 32/37
Write Protect USB Drive Step 1: Open the Registry Editor by opening the “Run”
dialog box, type regedit and hit “Enter”).
Step 2.Go to Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlS
et\Control\
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 33/37
Cont: Step3: Right-click on Control, click on New->Key and
name it as StorageDevicePolicies. Now a New Keynamed as StorageDevicePolicies is created.
Step 4. Right-click on StorageDevicePolicies andcreate a New->DWORD (32-bit) Value and name it as
WriteProtect.
Step 5: By double clicking on WriteProtect, set value 1from 0.
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 34/37
Write Protect USB- Cont:No w the right-protection for USB drives is enabled on your
computer thus it would not be possible for anyone or anyprogram to add/delete the contents from USB flash drive.
Any attempt to copy or download the files onto the USBdrive will result error message:
"Remove the Write Protection or Use another Disk"
8/11/2019 Combating Cyber Crime
http://slidepdf.com/reader/full/combating-cyber-crime 35/37
Cyber Crime "unlawful acts wherein the computer is either
a tool or a target or both".
crimes where a computer is the target of thecrime,
crimes where a computer is a tool of the
crime, and
crimes where a computer is incidental to the
commission of the crime.