cyber crime &_info_security
TRANSCRIPT
![Page 1: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/1.jpg)
“Aut viam inveniam aut faciam ” Hannibal Barca
CYBER CRIME & INFORMATION
SECURITY
![Page 2: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/2.jpg)
there is 10 kinds of people in the world ,
those that know they've been hacked
and those that don't.
DO YOU KNOW?
2
![Page 3: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/3.jpg)
• The opinion here represented are my personal ones and do
not necessary reflect my employers views.
• Registered brands belong to their legitimate owners.
• The information contained in this
presentation does not break any intellectual
property, nor does it provide detailed
information that may be in conflict with
actual laws (hopefully...) :)
DISCLAIMER(S)
3
![Page 4: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/4.jpg)
• Information and resources from Internet were
extensively used for the creation of this presentation.
REFERENCES
4
![Page 5: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/5.jpg)
• Why are we here?
• Interactive Session….
• Get the maximum out of this
session.
BEFORE WE START
5
![Page 6: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/6.jpg)
CONCLUSION
INFORMATION SECURITY
INFORMATION SECURITY
INFORMATION SECURITY
INTRODUCTION
CONTENTS
6
![Page 7: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/7.jpg)
• To take you from the “don’t know” state to
“know” state.
OBJECTIVE
7
![Page 8: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/8.jpg)
• The 3 upcoming technology areas (Triple-S –
3S)
3 UPCOMING DOMAINS
8
![Page 9: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/9.jpg)
• The 3 upcoming technology areas (Triple-S –
3S).
• Synchronize (Collaboration)
• Store (Storage),
• Secure – (Security)
• Its challenging
• You need to have the “stuff”
3 UPCOMING DOMAINS
9
![Page 10: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/10.jpg)
• Almost all the major / critical networks like:
• Defense,
• Communication,
• Financial,
• Infra networks, (Power Grids,)
• anywhere & everywhere....
SCOPE – SECURITY PRO
10
![Page 11: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/11.jpg)
THE MONEY FACTOR
11
![Page 12: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/12.jpg)
• Average hourly rate – $40 – $60
• Skilled Security Pro’s – $100 – $120 - $150
• 100 X 8 hrs = 800
• 800 X 5 days = 4000
• 4000 X 4 weeks = 16,000
• $ 16,000 to INR (Rs 50) = 8,00,000
FINANCIALS – SKILLED “PRO”
12
![Page 13: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/13.jpg)
# IT‘S A LONG JOURNEY
Always remember - you cannot master
everything in a single day or through a single
course
"Be not afraid of growing slowly, be
afraid of standing still"
13
![Page 14: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/14.jpg)
• World wide internet usage (2008) -
694 Million
• World wide internet usage ( Jun 2010) -
1.97 Billion
• World wide internet usage ( Dec, 31 2011) -
6,930,055,154 (6.93 Billion)
INTERNET – THE BIG PICTURE
14
![Page 15: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/15.jpg)
• 107 trillion – Emails sent on the Internet (2010)
• 294 billion – Average # of email messages per
day.
• 1.88 billion – # of email users worldwide.
• 89.1% – The share of emails that were spam.
• 262 billion – The number of spam emails per
day
EMAIL – THE BIG PICTURE
15
![Page 16: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/16.jpg)
So what are the possibilities when you get
connected?
POSSIBILITIES?
16
![Page 17: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/17.jpg)
• 6.93 Billion users can communicate with your
system
or
• Your system can communicate with 6.93
Billion users.
THE BIGGER PICTURE
17
![Page 18: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/18.jpg)
• Out of the 6.93 Billion, some can rattle your
door to your computer to see if it is locked or
not
• locked – Its fine
• not locked – not fine
THE BIGGER PICTURE
18
![Page 19: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/19.jpg)
• Out of the 1.8 Billion, if 1% connects to your
system, what will happen?
• 1 % = ?
CAN YOU HANDLE IT?
19
![Page 20: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/20.jpg)
# DO YOU REMEMBER CAT 2K9?
20
![Page 21: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/21.jpg)
# CASE STUDY
21
![Page 22: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/22.jpg)
# CASE STUDY
• The most powerful and costliest(physics) experiment ever built
• 5000 high power magnetsarranged in a 27 km giant tunnel.
• will re-create the conditionspresent in the Universe just afterthe Big Bang
• Large Hadron Collider (LHC)
• CERN - European Organization forNuclear Research
• Hacked on 10 Sep 0822
![Page 23: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/23.jpg)
# CASE STUDY
23
![Page 24: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/24.jpg)
CASE STUDY
24
![Page 25: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/25.jpg)
CASE STUDY
25
![Page 26: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/26.jpg)
VICTIMS
26
![Page 27: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/27.jpg)
VICTIMS
27
![Page 28: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/28.jpg)
VICTIMS
28
![Page 29: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/29.jpg)
• What’s happening in the Indian Web Space?
• 14 Aug – Independence day of Pakistan
• Underground cracking groups
• http://www.pakcyberarmy.net/
• http://www.pakhaxors.com/forum.php
WHAT’S THE LATEST
HAPPENING?
29
![Page 30: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/30.jpg)
• The Two Pakistani Cracker Groups reportedly
defaced a dozen of Indian Websites including:
• http://mallyainparliament.in/ and
• http://malegaonkahero.com/
WHAT’S THE LATEST
HAPPENING?
30
![Page 31: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/31.jpg)
What’s the latest happening?
31
![Page 32: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/32.jpg)
EVEN THE PM WAS NOT
SPARED
32
![Page 33: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/33.jpg)
• 15 Aug 2010
• In return an Indian underground group called
as Indian Cyber Army (http://indishell.in)
defaced around 1226 websites of Pakistan.
WHAT’S THE LATEST
HAPPENING?
33
![Page 34: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/34.jpg)
• 1 million passwords exposed
• 25 million entertainment users Info @ Risk
• More than 20,000 credit card and bank
account numbers @ Risk
• Initial attack – leak of over 70 million accounts
from Sony’s Playstation Network
Ref: - http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack/
CASE STUDY – SONY OWNED
34
![Page 35: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/35.jpg)
•LulzSec - The Hacker Group - Statement:
“Why do you put such faith in a company that
allows itself to become open to these simple
attacks?“
• Your clients trust your network?
Ref: - http://www.thedailybeast.com/cheat-sheet/item/sony-hacked-again/tech/#
CASE STUDY – SONY OWNED
35
![Page 36: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/36.jpg)
WHO IS THIS?
36
![Page 37: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/37.jpg)
ARE WE AFFECTED?
37
![Page 38: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/38.jpg)
ARE WE AFFECTED?
• India – The largest democracy in the world.
• Election / Voting – The heart of this
democracy
• Is this voting secure?
• Indian Electronic Voting Machines are
Vulnerable
• Mr Hariprasad – Arrested on 22 Aug 2011
• http://indiaevm.org/
38
![Page 39: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/39.jpg)
BOT TAKEDOWN
• 11 Nov 2011 – Biggest Botnet Takedown ever
• Operation Ghost Click – by FBI
• Raided two data centers in Chicago and NY.
• Command and Control (C&C) Center consisting of
more than 100 servers
• Combined Operation - Trend Micro, Mandiant,
Neustar, Spamhaus and the University of Alabama
at Birmingham's computer forensics research
group.Reference: http://computerworld.co.nz/news.nsf/security/feds-lead-biggest-botnet-takedown-ever-end-massive-clickjack-fraud
39
![Page 40: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/40.jpg)
BOT TAKEDOWN
Vladimir Tsastsin, CEO of Rove Digital40
![Page 41: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/41.jpg)
VODAFONE GREECE SCANDAL
• 100+ VIP mobile subscribers have been
eavesdropped. (Govt members, Defence
officials including Greek PM, Foreign Minister,
Defence Minister, etc)
41
![Page 42: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/42.jpg)
TELECOM CASE STUDY?
• Also known as SISMI-Telecom scandal
• Uncovered in 2006
• Surveillance scandal believed to have begun
in 1996, under which more than 5,000 persons
phones were tapped
42
![Page 43: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/43.jpg)
TELECOM CASE STUDY?
43
![Page 44: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/44.jpg)
44
![Page 45: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/45.jpg)
LORDS OF DHARMARAJA
• United States-China Economic and Security
Review Commission(USCC)
• Tactical Network for Cellular Surveillance
(TANCS)
• Escrow
• Source code of Norton Antivirus
45
![Page 46: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/46.jpg)
• What does this mean?
• Internet = No boundaries
• You(r network) could be the next target
NO BOUNDERIES
46
![Page 47: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/47.jpg)
Protecting the resources by locking it under the
lock and key
TRADITIONAL SECURITY
CONCEPT
47
![Page 48: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/48.jpg)
• Security is a state of well being
• Security is all about being prepared for the
unexpected.
CURRENT SECURITY CONCEPT
48
![Page 49: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/49.jpg)
• What is a Cyber Crime?
“Any criminal activity that uses a computer
either as an:
• instrument or tool,
• Target, or
• as a means / incidental to crime
for committing crimes”
DIGITAL ATTACKS & CYBER
CRIMES
49
![Page 50: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/50.jpg)
• Physical Presence
• Can be performed without revealing your
identity.
• White Collar Crime
• Faster crime execution
• Remote execution
DIFFERENCE
50
![Page 51: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/51.jpg)
• Naïve computer users
• Greedy people
• Users who are not aware about the latest
mode of cyber crimes.
VICTIMS
51
![Page 52: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/52.jpg)
# CREDIT & DEBIT CARDS?
• How many of you use credit cards?
• What is the trust factor here?
52
![Page 53: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/53.jpg)
• Crackers / Intruders have broken into Web
servers owned by domain registrar and
hosting provider Network Solutions, planting
rogue code that resulted in the compromise of
more than 573,000 debit and credit card
accounts over a period of three months
# CASE STUDY
53
![Page 54: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/54.jpg)
CASE STUDY
54
![Page 55: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/55.jpg)
SSL
Image Source: http://www.awghost.com/images/ssl-cert.jpg55
![Page 56: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/56.jpg)
SSL
• Replaced by TLS
• Protects the communication by encryption
• Data is secure in-transit.
• But:
• Is it secure at the client side?
• Is it secure at the server side?
56
![Page 57: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/57.jpg)
# CREDIT & DEBIT CARDS?
57
![Page 58: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/58.jpg)
• What’s the image that comes to your mind
when you hear about “hacker” or “hacking”?
# HACKING
58
![Page 59: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/59.jpg)
BEFORE WE START….
59
![Page 60: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/60.jpg)
• Commonly defined in the media as:
“Illegal intrusion into a computer system
without the permission of the computer
owner/user”
# HACKING
60
![Page 61: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/61.jpg)
• Most people associate hacking with breaking
the law.
• Assume that everyone who engages in hacking
activities is a criminal
# MISCONCEPTIONS
61
![Page 62: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/62.jpg)
# HACKING
62
![Page 63: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/63.jpg)
Linux Penguin
# HACKING
63
![Page 64: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/64.jpg)
# HACKING
64
![Page 65: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/65.jpg)
BSD Daemon
# HACKING
65
![Page 66: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/66.jpg)
# HACKING
66
![Page 67: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/67.jpg)
PERL Camel
# HACKING
67
![Page 68: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/68.jpg)
# HACKING
68
![Page 69: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/69.jpg)
Open Source Log
# HACKING
69
![Page 70: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/70.jpg)
So what is hacker’s logo?
# HACKING
70
![Page 71: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/71.jpg)
But what is hacking in its real sense?
# HACKING
71
![Page 72: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/72.jpg)
• The Glider
• The mathematical game – The Game of Life.
• http://en.wikipedia.org/wiki/Hacker_Emblem
# HACKING
72
![Page 73: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/73.jpg)
# HACKER DEFINED
HACKER (Originally, someone who makes
furniture with an Ax.
73
![Page 74: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/74.jpg)
• Someone involved in computer
security/insecurity
• An enthusiastic home computer hobbyist
# HACKER
• A programmer(ing) culturethat originated in US academiain the 1960’s - nowadays closelyrelated with open source / freesoftware.
74
![Page 75: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/75.jpg)
• Started off – MIT – Late 1950’s
• Tech Model Rail Road club of MIT
• Donated old telephone equipment
• They re-worked & re-created a complex system
that allowed multiple operators to control
different parts of the track by dialing into the
appropriate sections.
# HISTORY OF HACKING
75
![Page 76: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/76.jpg)
# hacking & open source
76
![Page 77: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/77.jpg)
They called this new and inventive use of
telephone equipment hacking
# THEY CALLED IT HACKING
77
![Page 78: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/78.jpg)
• The conventional boundaries were broken also
at MIT Rail Road Club.
# HACKER EVOLUTION
78
![Page 79: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/79.jpg)
• Often known as “Programmer's programmer”
• Creator of Ghostscript, Open Source
implementation of the PostScript language.
• Founder of Aladdin Enterprises
• Authored or co-authored various RFCs - RFC
190, RFC 446, RFC 550, RFC 567, RFC 606, RFC
1950, RFC 1951 and RFC 1952
# DO YOU KNOW HIM?
79
![Page 80: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/80.jpg)
• Dr. L. Peter Deutsch
• Started programming at the age of 11.
• He was accepted to the MIT Rail Road club at
the age of 12 when he demonstrated his
knowledge of the TX-0 and his desire to learn.
# DO YOU KNOW HIM?
80
![Page 81: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/81.jpg)
• Fully transistorized computer
• Transistorized Experimental computer zero
• TX-0 - affectionately referred to as tixo
(pronounced "tix oh")
# TX-0
81
![Page 82: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/82.jpg)
• Age
• Race,
• Gender,
• Appearance,
• Academic degrees, and
• Social status were defied in search for freeinformation
# SHORT-PANT HACKER
82
![Page 83: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/83.jpg)
Know the difference between a cracker and a
hacker.
# HACKING
83
![Page 84: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/84.jpg)
Cracking – Criminal Hacking
• Pirated Software - Objectives
• Opening your doors for the attackers
CRACKING & PIRACY
84
![Page 85: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/85.jpg)
Flooding the bandwidth of the victim's network
so that he cannot use the internet or other
services
or
Spamming the victim mail box
DENIAL OF SERVICE (DOS)
ATTACKS
85
![Page 86: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/86.jpg)
• DoS Attacks possible at the application layer.
• Succeed by starving a system of critical
resources, vulnerability exploit, or abuse of
functionality.
• DoS at the application layer may target the
web server, database server or an
authentication server
DENIAL OF SERVICE
ATTACKS
86
![Page 87: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/87.jpg)
DO YOU KNOW?
87
![Page 88: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/88.jpg)
DO YOU KNOW?
88
![Page 89: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/89.jpg)
• Megaupload Limited
• Used to provide file hosting / storing and
viewing services.
• Hong Kong Based - started in 2005
• Founder – Kim Dotcom
• Domain name seized and shut down by US
on 19 Jan 2012.
WWW.MEGAUPLOAD.COM
89
![Page 90: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/90.jpg)
DO YOU KNOW?
90
![Page 91: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/91.jpg)
• The shut down led to a DoS attacks on
websites belonging to US Govt and
Copyright organizations.
• Anonymous Launches #OpMegaupload,
"Largest Attack Ever on Government and
Music Industry Sites"
• In Retaliation for Action Against
Megaupload.Com
WWW.MEGAUPLOAD.COM
91
![Page 92: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/92.jpg)
• #OpMegaupload - Anonymous used Low
Orbit Ion Cannon (LOIC) to take its targets
offline is the
• http://sourceforge.net/projects/loic/
LOIC
92
![Page 93: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/93.jpg)
• DoS - Simple DoS
• DDoS – Distributed Denial of Service Attack
• DRDoS – Distributed Reflective Denail of
Service Attack.
TYPES OF DOS
93
![Page 94: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/94.jpg)
• Malware
• Spyware
• Adware
• Scareware
• Scamware
• Virus
• Worm
• Trojan
MALWARE FAMILY
94
![Page 95: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/95.jpg)
MOBILE MAINFRAME &
MALWARE
• 15 millions cell phones sold a month.
• 509 million cell phones in use
• Larger than US as a telephone market95
![Page 96: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/96.jpg)
• Spreading via Bluetooth, MMS & Sending SMS messages
• Infecting files and Stealing data
• Enabling remote control of the smartphone
• Installing "fake" or non-working fonts and applications
• Combating antivirus programs
• Installing other malicious programs
• Locking memory cards
MOBILE MAINFRAME &
MALWARE
96
![Page 97: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/97.jpg)
• Spreading via removable media (memory sticks)
• Damaging user data
• Disabling operating system security mechanisms
• Downloading other files from the Internet
• Calling paid services
• Polymorphism
MOBILE MAINFRAME &
MALWARE
97
![Page 98: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/98.jpg)
MOBILE MAINFRAME &
MALWARE
Source: http://www.securelist.com/en/analysis?pubid=204792080
98
![Page 99: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/99.jpg)
MOBILE MAINFRAME &
MALWARE
99
![Page 100: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/100.jpg)
MOBILE CRIMES
• PAN – Blue-Tooth
• Switch it off when not in use – why?
• Insecure,
• Used for Pairing
• Can be used for something which you can’t
even think of……
100
![Page 101: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/101.jpg)
MOBILE PHONE CRIMES
• What is 11/3 or 11-M
• Series of coordinated bombings against the
Cercanías (commuter train) system of Madrid,
Spain on the morning of 11 March 2004 (three
days before Spain's general elections), killing
191 people and wounding 1,755
101
![Page 102: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/102.jpg)
11/3 or 11-M
• Mobile phones wereused.
• Do not allow strangersto make calls from yourmobile – your phonecould be detonating abomb.
102
![Page 103: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/103.jpg)
• 3 Information required for payment
• Credit Card Number
• Expiry Date
• Card Verification Value Code (CVV)
CREDIT CARD FRAUDS
103
![Page 104: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/104.jpg)
• Used to steam credit card information
• Easily available in the black market for cheap
rates
SKIMMERS
104
![Page 105: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/105.jpg)
• Hotel – Access Cards
• Booking and Stay Info.
• May also provide the attacker:
• Address / Identify Proof
• Credit Card Details
•
SMART CARDS
105
![Page 106: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/106.jpg)
• One computer in the network acting as
another to gain access to other resources on the
network
SPOOFING
106
![Page 107: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/107.jpg)
• Pornography - The first consistently successful
ecommerce product.
• Case Study - Bazee.com – CEO Arrest
• We all are responsible
PORNOGRAPHY
107
![Page 108: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/108.jpg)
• Sexual attraction to children by an adult
PEDOPHILES
108
![Page 109: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/109.jpg)
When chat rooms are used for carrying out
Digital Attacks and Cyber crimes.
• Hackers & Criminals meeting and attacking
• Cyber stalking – giving phone numbers
publically
• https://opindia.posterous.com/pages/anony
mous-irc
CHAT CRIMES
109
![Page 110: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/110.jpg)
•Phishing
•Smishing
•Vishing
***SHING
110
![Page 111: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/111.jpg)
• Technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means
PHISHING
111
![Page 112: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/112.jpg)
PHISHING
112
![Page 113: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/113.jpg)
PHISHING
113
![Page 114: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/114.jpg)
PHISHING
114
![Page 115: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/115.jpg)
PHISHING
115
![Page 116: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/116.jpg)
PHISHING
116
![Page 117: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/117.jpg)
PHISHING
117
![Page 118: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/118.jpg)
SMISHING
• SMiShing is a security attack in which the user
is tricked into downloading a Trojan horse, virus
or other malware onto his cellular phone or
other mobile device.
• SMiShing is short for "SMS phishing."
118
![Page 119: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/119.jpg)
VISHING
• Vishing is the criminal practice of using social
engineering and Voice over IP (VoIP) to gain
access to private personal and financial
information from the public for the purpose of
financial reward.
119
![Page 120: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/120.jpg)
• Copying / Encrypting the company's
confidential data in order to extort huge money
NET EXTORTION
120
![Page 121: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/121.jpg)
• Cyber Stalking - The criminal follows the victim by
sending mails, entering chat rooms, etc
• Cyber Defamation -disgruntled employee, ex-boy
friend against girls, divorced husbands against wife
• Cyber Threatening - Sends threatening emails /
messages to the victim.
CYBER STALKING
121
![Page 122: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/122.jpg)
• Criminal makes insignificant changes in such a
manner that such changes would go unnoticed.
SALAMI ATTACK
122
![Page 123: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/123.jpg)
• Narcotic Sale - Sale of banned drugs through
the internet.
• Endangered Species / Animals – Sale through
internet.
• Other Banned items like Elephant Trunks ,
Skins of animals likes Leopard / Tiger, etc
SALE OF BANNED ITEMS
123
![Page 124: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/124.jpg)
• Mail claiming you will get money
NIGERIAN SCAM
124
![Page 125: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/125.jpg)
DUMPSTER DIVING
125
![Page 126: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/126.jpg)
DUMPSTER DIVING
• Practice of sifting through commercial or
residential trash to find items that have been
discarded by their owners, but which may be
useful to the attacker.
126
![Page 127: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/127.jpg)
WAR DRIVING
127
![Page 128: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/128.jpg)
WAR DRIVING
• Also called access point mapping
• The act of locating and possibly exploiting
connections to wireless LANs while driving
around a city or elsewhere.
128
![Page 129: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/129.jpg)
WAR DRIVING
• You need
• a vehicle,
• a laptop,
• a wireless Ethernet card (promiscuous
mode), and
• an antenna129
![Page 130: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/130.jpg)
ATTACK ON NETWORK
SERVICES
Some of the common network services /
protocols:
• FTP
• SSH
• LDAP
• SMTP
130
![Page 131: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/131.jpg)
CRYPTOGRAPHIC ATTACKS
• Attack on cryptographic systems.
• Example: Cold Boot Attack
131
![Page 132: Cyber crime &_info_security](https://reader034.vdocuments.net/reader034/viewer/2022052700/55a0d2f11a28ab4c108b4784/html5/thumbnails/132.jpg)
CLOUD BASED ATTACKS
• One of the best platform for launching an
attack.
• Power
• Certain level of anonymity
• Scalability
• A 64 node Linux cluster can be online in just
five minutes
132