cyber crime and law regarding everything in this pdf
hritikop1999
61 views
80 slides
Jul 23, 2024
Slide 1 of 80
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
About This Presentation
EVERYTHING REGARDING CYBER CRIME AND LAW
Size: 14.32 MB
Language: en
Added: Jul 23, 2024
Slides: 80 pages
Slide Content
WORLDWIDE
4.2
BILLION
PEOPLE USE THE
INTERNET ACTIVELY
ESTIMATED
7%
INCREASE
IN THE INTERNET USERS
IN THE LAST YEAR ALONE
Source: International Telecommunications Union
The number of Internet users is growing
So…..
CYBER CRIME is bound to RISE………..
CYBER CRIMES RECORDED IN 2018
KARNATAKA
ThestatesofAndhraPradesh(1207)andTelangana(1205)
alongwithRajasthan(1104)areamongtheotherstates
whichhaverecordedahighnumberofcyber-crimecases.
6688
3076
2751
2704
Identity Theft Distribution of Sexually
Explicit Content
Offences other than
Ransomware under Sec 66
Cheating by Personation
MOST COMMON CYBER CRIMES
(INDIA -2018)
•Cheating,Fraud,CyberStalkingform
amajorityofcyber-crimesbooked
underIPC.
•39%ofthecasesbookedunder
varioussectionofIPCrelatedto
‘Fraud(undersection420,465,468-
471)’i.e.3,353casesacrossallthe
statesandUTs.
•Ofthese,amajorportionarerelated
toATMrelatedfraudswith1284
cases.Bihar,Maharashtraand
Odishaareamongthestateswiththe
highestnumberofATMrelated
frauds.
ATMs
Cases booked under various section of IPCrelated
to ‘Fraud(under section 420, 465, 468-471)’
309
1284
319
968
Credit/Debit
Card
Online Banking Fraud
OTP
15051
SEXUAL
EXPLOITATION
2030
1212
1050
CAUSING
DISREPUTE
EXTOR TION
FRAUD
CYBER CRIMES
CASES BY MOTIVE
(INDIA -2018)
HACKING
DENIAL OF SERVICE
ATTACK
TROJANS, WORMS &
VIRUSES
SOFTWARE
PIRACY
PORNOGRAPHY
CREDIT CARD
FRAUD
SPAMMING
PHISHING
SPOOFING
CYBER STALKING
CYBER
DEFAMATION
SALAMI ATTACK
DATA THEFT
IDENTITY THEFT
EMAIL SPOOFING
TYPES OF CYBER CRIME
Variants of Cyber Crime
acking
A crime which entails cracking systems and gaining unauthorized
access to the data stored in them.
yberSquatting
Act of registering a famous Domain Name and then selling it for a
fortune. This is an issue that has not been tackled in IT ACT 2000.
Prevention Against Hacking
Perform required software updates
Install a firewall on your computer
Change your passwords every month
Purchase or download antivirus software
Monitor network traffic
Restrict software installation
Use strong passwords
Do not share professional information on social networks
AnonymousIndiaclaimsthatRelianceJioissendingthis
datatocompaniesintheUSandSingaporeandhasalsolisted
astep-by-stepguideforanyonetoverifythisthemselves.
MyJioandJioDialer
appssendthis
informationtoanad
networkcalled
Mad-Me.
Reliance JioStill Sharing Your Call Information With Foreign Countries -
Anonymous India
VIRUS
WHAT IT IS?
A computer virus is a malware program that, when executed, replicates
by inserting copies of itself (possibly modified) into other computer
programs, data files, or the boot sector of the hard drive; when this
replication succeeds, the affected areas are then said to be "infected".
TYPES
Resident vs
Non-resident
Virus
Macro Viruses
Boot-sector
Viruses
IDENTITY THEFT
Identitytheftisaformoffraudorcheatingofanotherperson’s
identityinwhichsomeonepretendstobesomeoneelseby
assumingthatperson’sidentity,typicallyinordertoaccess
resourcesotherbenefitsinthatperson’sname.Information
Technology(Amendment)Act,2008,crimeofidentitytheftunder
Section66-C,whoever,fraudulentlyordishonestlymakeuseof
theelectronicsignature,passwordoranyotherunique
identificationfeatureofanyotherpersonknownasidentitytheft.
Ways to steal identity: Data Breaching, Unsafe social media usage, Email hacks
According to the Norton report,
•Every four of 10 Indians have experienced identity theft
•61% of participants feel they are protected against identify theft, but 63% didn't know
what to do after it.
Indian Banking: Biggest
data security Breach
•About32lakhATMcardswerehit
bycyberattackinOctober2016.
•ATMcardsofthecustomerswere
blockeden-massetoavertfinancial
damage,butitraisesserious
concernsoversafetyofonline
bankinginIndia.
Who is Responsible In Case of a
Banking Fraud?
“Ifanybodylosesmoneyonlinetheendusersare
liableforthelossnotthebanks,unlesstheuser
provestothebankthatthefraudwas‘not’aresult
ofnegligence.Negligencemeansauser’ssystem
hadmaliciousprogrammethatstolecredentials
ortheuserloggedintoanunsafesystem.These
thingsareextremelydifficulttoprove.So,
ultimatelyitbecomesauserproblem.Thebanks
donottakeresponsibility.”
YashKS, Software Architect Qualysin aninterview
Vishing is the criminal practice of
using social engineering and
Voice over IP (VoIP) to gain
access to private personal and
financial information from the
public for the purpose of financial
reward. The term is a
combination of “Voice” and
phishing. Vishing exploits the
public’s trust in landline
telephone services.
Vishing is typically used to
steal credit card numbers or
other information used in
identity theft schemes from
individuals.
02
01
03
SPIM
Spimis spam sent via instant messaging (IM).
The IMs could include spyware, keyloggers,
viruses, and links to phishing sites.
KEYLOGGERS
A keyloggeris a form of spyware
that records keystrokes as you
type. The information you type is
then saved to a file that the
hacker can access. If you are
surfing the web and visiting
banking and e-commerce sites, a
keyloggercan potentially record
your account and password
information
SPYWARE
This is software that a hacker
surreptitiously installs on your
computer to collect personal
information, such as which
websites you visit. It can also be
used to direct you to fake
websites, change your settings,
and take control of your
computer in other ways.
Caller ID spoofing
CallerIDspoofingisthe
practiceofcausingthe
telephonenetworktodisplaya
numberontherecipient'scaller
IDdisplaywhichisnotthatof
theactualoriginatingstation.
Eg.www.crazycall.net
IP
SPOOFING
IP spoofing refers to the creation of Internet
Protocol (IP) packets with a forged source IP
address.
Purpose is concealing the identity of the
sender or impersonating another computing
system.
Routers use the destination IP address to
forward packets, but ignore the source IP
address.
The source IP address is used only by the
destination machine, when it responds back
to the source.
Goal is to flood the victim with overwhelming
amounts of traffic, and the attacker does not
care about receiving responses to the attack
packets.
IP
SPOOFING
Packets with spoofed addresses are
thus suitable for such attacks.
They have additional advantages for
this purpose—they are more difficult
to filter since each spoofed packet
appears to come from a different
address, and they hide the true
source of the attack.
IP
SPOOFING EXAMPLE
A Valid Source IP
IP
SPOOFING EXAMPLE
A Spoofed Source IP
Software piracy is theft of software through the
illegal copying of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original. Retail revenue
losses worldwide are ever increasing due to this
crime.
This can be done in various ways-
End user copying
Source: http://beebom.com/wp
content/uploads/2012/06/software-piracy.gif
Hard disk loading Counterfeiting
Illegal downloads from the internet etc.
Software piracy
Alice
Bob
Eve
I’m
Bob!
I’m
Alice!
1. Eve assumes a man-in-the-
middle position through some
mechanism. For example, Eve could
use router hacking etc...
2. Eve can monitor traffic between
Alice and Bob without altering the
packets or sequence numbers.
3. At any point, Eve can assume the
identity of either Bob or Alice
through the Spoofed IP address.
This breaks the pseudo connection
as Eve will start modifying the
sequence numbers
Man in the Middle Attack
Sending unwanted commercial e-mail, advertising
for products, services, and Web sites.
Spam can also be used as a delivery mechanism for
malicious software and other cyber threats.
SPAMMING
How Much Does it Cost to Receive Spam?
•Spamusesalargeamountofbandwidth.Thatcostis,ofcourse,passedalongtoyoueitherasahigher
InternetbillorasdecreasedperformanceatyourISP.
•Second,spamrequirestheattentionofISPs.Theymustattempttofilterit,respondtocustomercomplaints
regardingspam,andotherwisedevotetimetospamthatcouldbebetterspentimprovingcustomerserviceor
thetechnicalqualityoftheirISP.
•Finally,probablythemostsignificantcostofspamisthecosttothereceiverdealingwithitintermsoftheir
time.
Posting your email address on auctions, bulletin
boards, chat rooms, or advertising.
Businessesmightsellyouremailaddressorotherpersonalinformation
toaspammer(however,legitimatebusinessesdonotdothis).
Spammers can use software programs to collect email addresses from
web sites.
Itisanattempttomakeacomputerresourceunavailabletoitsintendedusers.
Denial of Service (DoS) Attack
•attemptsto"flood"anetwork,therebypreventinglegitimatenetwork
traffic
•attemptstodisruptconnectionsbetweentwomachines,thereby
preventingaccesstoaservice
•attemptstopreventaparticularindividualfromaccessingaservice
•A network of remotely controlled
systems used to coordinate
attacks and distribute malware,
spam, and phishing scams.
•Bots (short for “robots”) are programs that are secretly installed on a targeted
system allowing an unauthorized user to remotely control the compromised
computer for a variety of malicious purposes.
Botnets
•PingofDeathattackinvolvedsending
IPpacketsofasizegreaterthan65,535
bytestothetargetcomputer.
•IPpacketsofthissizeareillegal,but
hackerscanbypassthisbycleverly
sendingthepacketsinfragments.
Whenthefragmentsareassembledon
thereceivingcomputer,theoverall
packetsizeistoogreat.Thiswillcause
abufferoverflowandcrashthedevice.
PING OF DEATH
Teardrop Attack
Teardrop attacks target
vulnerability in the way
fragmented IP packets
are reassembled.
In the teardrop attack, the
attacker's IP puts a confusing
offset value in the second or
later fragment.
If the receiving operating
system does not have a
plan for this situation, it
can cause the system to
crash.
How to ensure Android Security?
Keep your device updated!
•TheOEM(OriginalEquipmentManufacturer)ofthe
deviceusuallysendsOTA(over-the-air)updates
everymonthoronceintwomonthswhichfixesthe
currentsecuritypatches.
Deny Permissions
•InAndroid6.0andabove,youhavetheauthorityto
denypermissiontoapps.
•A web app andAndroidapp to locate lost or
stolen device.
Android Device Manager
500,000 Hacked Zoom Accounts Being Sold on
Dark Web
April 2020
Unprecedented level of growth in the past
month due to coronavirus
The sudden growth has led to several
privacy and security concerns surrounding
Zoom
More than 500,000 Zoom accounts are being offered for sale on the dark web and
hacker forums for 0.0020 cents each, and in some cases accounts are given away for
free.
As a result, Google, SpaceX, NASA, Standard Chartered, Siemens, all Taiwanese Government
Agencies and Australian DefenceForce lost trust in the app and banned the useof Zoom App.
Europe’s Largest Private Hospital
Operator Fresenius Hit by Ransomware
Ranked 258
th
on the Forbes Global 2000
•Thecompanyprovidesproductsandservicesfordialysis,hospitals,andinpatientand
outpatientcare,withnearly40percentofthemarketsharefordialysisintheUnitedStates.
•ThisisworrisomebecauseCOVID-19causesmanypatientstoexperiencekidneyfailure,
whichhasledtoashortageofdialysismachinesandsupplies.
Apparentculprit-theSnakeransomware,
arelativelynewstrainfirstdetailedearlier
thisyearthatisbeingusedtoshakedown
largebusinesses,holdingtheirITsystems
anddatahostageinexchangeforpayment
inadigitalcurrencysuchasbitcoin.
Exposed dataof 22 million users
Data Breach at
Unacademy
May 2020
Hackers kept user records for sale at $2,000
•Usernamesandhashedpasswords
•Dateofjoining,Lastlogindate
•Accountstatus
•emailaddresses,firstandlastnames,and
otheraccountprofiledetails.
Compromised information included
Cybersecurity: Fighting a Threat That
Causes Billions of Damage
2014
$800M
2019
$3.5B
2025
(Expected)
$27B
*
Atlas VPN Estimations
India–Ranked #3 among top 20 Cyber Crime Victims
(as per FBI Report, 2019)
Phishingand similar ploys,
personal data breach, romance
fraud and spoofing
(Most Common Internet Crimes)
27,248
Registered cases of
cyber crime
2901
Victims
(3
rd
Most Impacted
Country in the World)
EXPECTED FUTURE DEVELOPMENTS
Online scams, phishing and BECwill surge due to the economic downturn
and shift in business landscape, generating new criminal activities.
Threat actors will target individuals’ personal information through the
spoofing and exploitation of digital content providers.
Governments,businessesandschoolswillcometorelyononline
connectivityandvirtualcommunicationstoolsasemployeescontinueto
workfromhome,increasingtheirvulnerabilitiesandpresentingmore
opportunitiesforcybercriminalstoexploit.
Criminals will take advantage of the underground market to look for
‘cybercrime-as-a-service’ given the ease of accessand low cost.
DELHI POLICE
GUIDELINES IN
THE WAKE OF
RAMPANT
C VID-19
COMPUTER FORENSICS
Branch of digital forensic science pertaining to legal evidence found in computers and
digital storage media. The goal of computer forensics is to examine digital media in a
forensically sound manner with the aim of identifying, preserving, recovering,
analyzing and presenting facts and opinions about the digital information.
Role of computer forensics professional: gather evidence to prove a suspect
committed a crime or violated a company policy
Investigate the
suspect’s computer
Preserve the evidence
on a different computer
Recovering the
evidences
Analyzing the
evidences
Collect evidence that can be offered in court or at a corporate inquiry
Preparing a Computer Investigation
AGAINST CYBERCRIME
& FOR CYBERSECURITY
INDIAN COUNTERMEASURES
LAWS, EFFORTS, POLICIES, TECHNOLOGIES
(Existing penal provisions for
different cybercrimes )
Sections Relevant in IT Act, 2000and
Amendments
Cyber Attacks/Crime Brief Description
Cyber Stalking Stealthily following a person, 43, 66
tracking his internet chats. (Compensation and punishment of
three years with fine)
Intellectual Property Crime Source Code Tampering etc. 43, 65, 66
(Compensation and punishment of
three years with fine)
Salami Attack Deducting small amounts from an 43, 66
(Theft of data or account without coming in to (Compensation and punishment of
manipulating banking account) notice, to make big amount three years)
E-Mail Bombing Flooding an E-mail box with 43, 66
innumerable number of E-mails, to (Compensation and punishment of
disable to notice important three years)
message at times.
Phishing Bank Financial Frauds in Electronic 43, 66, 66C
Banking (Compensation and punishment of
three years with fine)
Personal Data Theft Stealing personal data 43, 43A, 72A
(Compensation and punishment of
three years with fine)
Identity Theft Stealing Cyberspace identity 43
information of individual (Compensation and punishment of
three years with fine)
Spoofing Stealing Credentials using, friendly 43, 66
and familiar GUI’s (Compensation and punishment of
three years with fine)
Data Theft Stealing Data Provisions under 43, 43A, 65,66
and 72
(Compensation and punishment of
three years with fine)
Worms Trojan Horses, Virus Different Hacking mechanisms 43, 66
etc. (Compensation and punishment of
three years with fine)
Sabotage of Computer Taking control of computer with 43, 66
the help of malware. (Compensation and punishment of
three years with fine)
DOS, DDOS Demat of Service Flooding a computer with Denial of 43, 66, 66F
Service Attacks, DDOS is (Compensation (up to life
Distributed DOS attack imprisonment under 66F)
Web Defacing Web Pages Defacing 43, 66
(Compensation and punishment of
three years with fine)
Logic Bomb Attack triggers on an event 43, 66
(Compensation and punishment of
three years with fine)
ATM fraud/EDI Financial fraud in ATM and e- 43, 66
TostrengthenthecybersecurityecosysteminIndia,theIndiangovernmenthas
launchedfollowinginitiatives:
•Cyber SurakshitBharat initiative
•Cyber SwachhtaKendra
•National Cyber Crime Reporting Portal
•National Critical Information Infrastructure Protection Centre
To spread awareness,
build capacity as well as
enable government
departments on steps that
need to be taken to create a
Cyber Resilient IT setup.
To protect critical information of our country, which has an enormous impact
on national security, economic growth, or public healthcare.