SlideShare a Scribd company logo
1 of 30
W/O SUNETTE POTGIETER
0825569310
WHAT IS CYBER CRIME?
 Cyber crime encompasses any criminal act dealing
with computers and networks. Additionally, cyber
crime also includes traditional crimes conducted
through the Internet. For example; hate crimes,
telemarketing and Internet Fraud, Identity Theft, and
Credit Card Account Thefts are considered to be Cyber
Crimes when the illegal activities are committed
through the use of a computer and the Internet.
HOW HAS THINGS CHANGED:
WHERE IS THE EVIDENCE NOW?
PAST: Physical documents
PRESENT: Data contained in:
- Computers
- Cell phones
- Tablets
PAST: Postal Service
PRESENT: WWW (World Wide Web)
CRIMES
 CARD FRAUD ON INTERNET
 BID OR BUY / EBAY – NON DELIVERY OF
GOODS
 EFT TRANSACTIONS
 PHYSING
 PHARMING
 419 SCAMS
 YOU HAVE WON! SCAMS (RICA)
 OVER DEPOSIT SCAMS (TELKOM, SARS)
CYBER CRIME TERMINOLOGY
 Phishing:
 A technique whereby the perpetrator impersonates
another individual or business through the use of e-mail
or Web sites that copy (or mimic) legitimate e-mail or
Web site characteristics.
 How Phishing works
 This scam uses email or pop-up messages to trick the
victim into disclosing their credit card number, bank
account information, password or other sensitive
information.
 Emails claim to be from a business or organization the
victims know - such as a bank or online payment service
 Spear phishing
 A targeted form of phishing where e-mails or
Web sites are transmitted to an identified
target of the activity, as opposed to the use of
phishing, designed to ensnare targets that
have not been previously identified (i.e.,
spamming). Spear phishing is a form of
social engineering
 Pretexting
 The act of creating and using an invented
scenario (the pretext) to persuade a targeted
victim to release information or perform an
action.
 Pretexting is typically done over the telephone.
It is more than a simple lie, as it often involves
some prior research to set up and use the pieces
of information (e.g., date of birth) to establish
legitimacy and perceived authority in the mind
of the target
 Spoofing
 A scheme in which a person or program
masquerades as another by falsifying data
resulting in the deception of the recipient or user.
 Spoofing takes many forms. Web page spoofing
involves use of a Web page that reproduces the
"look and feel" of a legitimate site, but is under
the control of another for the purpose of
collecting information from a user who believes
they are interacting with the trusted site.
Smishing
A text message is sent to the victim’s
mobile phone that asks the victim to
call a toll-free number.
Once that call is made, they will ask
for personal information such as
Account Number, Credit/Debit card
number.
KEY LOGGERS
 A criminal suspect can install key loggers in
public computers (such as cyber cafes,
airport lounges etc) or the computers of the
victim. Unsuspecting victims would use
these compromised computers to make
online transactions. The credit card
information of the victim would be emailed
to the suspect.
SPYWARE, MALWARE, VIRUSES
 Spyware is a software that aids in gathering
information about a person or organization without
their knowledge and that may send such information
to another entity without the consumer's consent, or
that asserts control over a computer without the
consumer's knowledge.
 Malware, short for malicious software, is software
used or programmed by attackers to disrupt computer
operation, gather sensitive information, or gain access
to private computer systems
 Computer Virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs,
data files, or the boot sector of the hard drive; when
this replication succeeds, the affected areas are then
said to be "infected". Viruses often perform some type
of harmful activity on infected hosts, such as stealing
hard disk space or CPU time, accessing private
information, corrupting data, displaying political or
humorous messages on the user's screen, spamming
their contacts, or logging their keystrokes
THEFT OF PAYMENT
INFORMATION
 TROJAN HORSE : A hacking program, which gains
privileged access to the operating system while
appearing to perform a desirable function.
 Banking Trojans are the most dangerous kind.
 Automatically collects all payment data and
sometimes even conducts financial transactions on the
victims behalf
They capture keystrokes, makes screenshots, bypasses
virtual keyboards, changes hosts files and redirects user
to fake website
LETS LOOK AT A STUDY DONE BY NORTON
DURING 2012.
And some Internet Security Tips
CYBER CRIME GOES
MOBILE
MOBILE DEVICES
 PC’s Still remain the Primary targets, but cyber
criminals are also finding ways to attack
consumers on mobile devices
 McAfee found 13000 different types of Mobile
malware in 2012 compared to 2000 in 2011
SECURITY
 There exists various applications for smartphones
whereby they can remotely locate, lock and even
wipe data from a misplaced or lost device
 Data can also be backed up to a Cloud
 A huge part of our lives are contained in these
small devices
 More and more personal and valuable information
is stored on these devices such as banking
particulars, personal particulars, passwords.
 Are we really aware of how valuable such
information is to a criminal?
Mobile year in review
Cyber Crime goes Mobile
SAFE GAURDS
 PASSWORDS:
• Passwords protect your stuff
• A good password stops a hacker in his/her tracks
• A good password doesn’t make you crazy trying
to remember it
• A good password strategy = peace of mind
POPULAR PASSWORDS
12345
123456
1234567
12345678
123123
111111
Password
Passw0rd
Password1
Abc123
Monkey
Trustn01
Dragon
Baseball
Iloveyou
Master
Sunshine
Qazwsx
Superman
Michael
Football
Ashley
Bailey
Shadow
Letmein
Blink182
Admin1
Think Unique
• Not guessable word or phrase
• Different for each site and account
• Some use a few complex passwords and then one
“master” passwords for accounts considered
unimportant
• All accounts are important
• Not password that anyone else would use
No Dictionary Words
 Avoid using full words you might find in a
dictionary
 Real words can be “edited” for password use
 Dictionary becomes
 D1(t10nAry (as an example)
 But hackers are “on to” common letter replacement
tricks like these
No Pet Names
 Children often use their pet’s name
 Friends and siblings hack accounts this way
 Security Questions and Answers should be
hard to guess
 You can use “fake” answers to “mother’s
maiden name” but you’ll need to remember
what you used
 Better are sites that let you create your own
questions
Pay Particular Attention to Most
Important Accounts
 Email is most important
 “Forgot your password” link on sites goes to
email
 Hacker with access to email can reset all other
accounts
 Nearly as important is social networking
 Hacker can run scams against friends and
colleagues
 Financial sites and shopping sites with stored
credit cards, too
Never Share or Show Passwords
 Don’t write them down
 Never email or text them to someone
 If you tell it to someone, change the password as
soon as possible
 Legitimate companies NEVER ask for your account
password
INTERNET SECURITY
 Get a security product for all devices:
 Computers
 Mobile phones
 Tablets
 Prevent password-stealing malware from infecting
your device
Secure Mobile Devices with a
Password
 Mobile apps may auto log you in to accounts
 Protect access with a password on phone or tablet
 Remove apps you don’t use anymore that may have
credit cards or financial info store:
 Shopping sites
 Banking and Investment companies
 Travel sites
TO SUM UP…
 Create unique passphrase (no dictionary words)
 Nothing others will guess
 Customize for each site
 Focus on email, social, financial sites first
 Use password managers
 Never share or show passwords
 Take action if breached
 Use security software
 Set passwords on mobiles
THANK YOU

More Related Content

What's hot

Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icaiMayank Garg
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe TNS Group
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)marie120206
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safeaaberra
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 

What's hot (20)

Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Bi
BiBi
Bi
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Facebook
FacebookFacebook
Facebook
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icai
 
The Emotional Lure of Social Engineering
The Emotional Lure of Social EngineeringThe Emotional Lure of Social Engineering
The Emotional Lure of Social Engineering
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Computer crimes(1)
Computer crimes(1)Computer crimes(1)
Computer crimes(1)
 
Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 

Similar to Cyber crime

S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHemantSharma134028
 
Data theft
Data theftData theft
Data theftLaura
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 

Similar to Cyber crime (20)

cyber_crim.pptx
cyber_crim.pptxcyber_crim.pptx
cyber_crim.pptx
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptxHHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
HHW OF IT PRESENTATION ON INTERNET SECURITY BY AASTHA SHARMA 10TH KEATS^.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data theft
Data theftData theft
Data theft
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 

More from Durban Chamber of Commerce and Industry

Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Durban Chamber of Commerce and Industry
 

More from Durban Chamber of Commerce and Industry (20)

SUMMARY AMENDED CCMA RULES
SUMMARY AMENDED CCMA RULESSUMMARY AMENDED CCMA RULES
SUMMARY AMENDED CCMA RULES
 
201507 caisson repair project final
201507 caisson repair project final201507 caisson repair project final
201507 caisson repair project final
 
Simply biz shift questions with allon dbn 2 v2
Simply biz shift questions with allon dbn 2 v2Simply biz shift questions with allon dbn 2 v2
Simply biz shift questions with allon dbn 2 v2
 
Speakers' profiles
Speakers' profilesSpeakers' profiles
Speakers' profiles
 
Mail shot wom. conv. a4
Mail shot   wom. conv. a4Mail shot   wom. conv. a4
Mail shot wom. conv. a4
 
Talk sign a5 flyer 2015
Talk sign a5 flyer 2015Talk sign a5 flyer 2015
Talk sign a5 flyer 2015
 
ethekwini municipality 2013 2014 annual report
ethekwini municipality 2013 2014 annual reportethekwini municipality 2013 2014 annual report
ethekwini municipality 2013 2014 annual report
 
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
 
Sefa breakfast session presentation
Sefa breakfast session presentationSefa breakfast session presentation
Sefa breakfast session presentation
 
Invitation letter to careers expo 2015
Invitation letter to careers expo 2015Invitation letter to careers expo 2015
Invitation letter to careers expo 2015
 
Invitation to submit tenders to organise the sacci annual convention
Invitation to submit tenders to organise the sacci annual conventionInvitation to submit tenders to organise the sacci annual convention
Invitation to submit tenders to organise the sacci annual convention
 
Media release phoenix ink business directory approved 13 jan2015
Media release phoenix ink business directory approved 13 jan2015Media release phoenix ink business directory approved 13 jan2015
Media release phoenix ink business directory approved 13 jan2015
 
Daily market commentary 10122014
Daily market commentary 10122014Daily market commentary 10122014
Daily market commentary 10122014
 
Invitation
InvitationInvitation
Invitation
 
Daily market commentary 11112014
Daily market commentary 11112014Daily market commentary 11112014
Daily market commentary 11112014
 
Daily market commentary 10102014
Daily market commentary  10102014Daily market commentary  10102014
Daily market commentary 10102014
 
Jirah article 2014
Jirah article 2014Jirah article 2014
Jirah article 2014
 
KZN Infrastructure Funding Fair
KZN Infrastructure Funding Fair KZN Infrastructure Funding Fair
KZN Infrastructure Funding Fair
 
Gibela supplier specs
Gibela supplier specs Gibela supplier specs
Gibela supplier specs
 
Tongaat Hullett - Durban Investment Roadshow
Tongaat Hullett - Durban Investment RoadshowTongaat Hullett - Durban Investment Roadshow
Tongaat Hullett - Durban Investment Roadshow
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Cyber crime

  • 2. WHAT IS CYBER CRIME?  Cyber crime encompasses any criminal act dealing with computers and networks. Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet Fraud, Identity Theft, and Credit Card Account Thefts are considered to be Cyber Crimes when the illegal activities are committed through the use of a computer and the Internet.
  • 3. HOW HAS THINGS CHANGED: WHERE IS THE EVIDENCE NOW? PAST: Physical documents PRESENT: Data contained in: - Computers - Cell phones - Tablets PAST: Postal Service PRESENT: WWW (World Wide Web)
  • 4. CRIMES  CARD FRAUD ON INTERNET  BID OR BUY / EBAY – NON DELIVERY OF GOODS  EFT TRANSACTIONS  PHYSING  PHARMING  419 SCAMS  YOU HAVE WON! SCAMS (RICA)  OVER DEPOSIT SCAMS (TELKOM, SARS)
  • 5. CYBER CRIME TERMINOLOGY  Phishing:  A technique whereby the perpetrator impersonates another individual or business through the use of e-mail or Web sites that copy (or mimic) legitimate e-mail or Web site characteristics.  How Phishing works  This scam uses email or pop-up messages to trick the victim into disclosing their credit card number, bank account information, password or other sensitive information.  Emails claim to be from a business or organization the victims know - such as a bank or online payment service
  • 6.  Spear phishing  A targeted form of phishing where e-mails or Web sites are transmitted to an identified target of the activity, as opposed to the use of phishing, designed to ensnare targets that have not been previously identified (i.e., spamming). Spear phishing is a form of social engineering
  • 7.  Pretexting  The act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action.  Pretexting is typically done over the telephone. It is more than a simple lie, as it often involves some prior research to set up and use the pieces of information (e.g., date of birth) to establish legitimacy and perceived authority in the mind of the target
  • 8.  Spoofing  A scheme in which a person or program masquerades as another by falsifying data resulting in the deception of the recipient or user.  Spoofing takes many forms. Web page spoofing involves use of a Web page that reproduces the "look and feel" of a legitimate site, but is under the control of another for the purpose of collecting information from a user who believes they are interacting with the trusted site.
  • 9.
  • 10. Smishing A text message is sent to the victim’s mobile phone that asks the victim to call a toll-free number. Once that call is made, they will ask for personal information such as Account Number, Credit/Debit card number.
  • 11. KEY LOGGERS  A criminal suspect can install key loggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these compromised computers to make online transactions. The credit card information of the victim would be emailed to the suspect.
  • 12. SPYWARE, MALWARE, VIRUSES  Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.  Malware, short for malicious software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems
  • 13.  Computer Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes
  • 14. THEFT OF PAYMENT INFORMATION  TROJAN HORSE : A hacking program, which gains privileged access to the operating system while appearing to perform a desirable function.  Banking Trojans are the most dangerous kind.  Automatically collects all payment data and sometimes even conducts financial transactions on the victims behalf They capture keystrokes, makes screenshots, bypasses virtual keyboards, changes hosts files and redirects user to fake website
  • 15. LETS LOOK AT A STUDY DONE BY NORTON DURING 2012. And some Internet Security Tips
  • 17. MOBILE DEVICES  PC’s Still remain the Primary targets, but cyber criminals are also finding ways to attack consumers on mobile devices  McAfee found 13000 different types of Mobile malware in 2012 compared to 2000 in 2011
  • 18. SECURITY  There exists various applications for smartphones whereby they can remotely locate, lock and even wipe data from a misplaced or lost device  Data can also be backed up to a Cloud  A huge part of our lives are contained in these small devices  More and more personal and valuable information is stored on these devices such as banking particulars, personal particulars, passwords.  Are we really aware of how valuable such information is to a criminal?
  • 19. Mobile year in review Cyber Crime goes Mobile
  • 20. SAFE GAURDS  PASSWORDS: • Passwords protect your stuff • A good password stops a hacker in his/her tracks • A good password doesn’t make you crazy trying to remember it • A good password strategy = peace of mind
  • 22. Think Unique • Not guessable word or phrase • Different for each site and account • Some use a few complex passwords and then one “master” passwords for accounts considered unimportant • All accounts are important • Not password that anyone else would use
  • 23. No Dictionary Words  Avoid using full words you might find in a dictionary  Real words can be “edited” for password use  Dictionary becomes  D1(t10nAry (as an example)  But hackers are “on to” common letter replacement tricks like these
  • 24. No Pet Names  Children often use their pet’s name  Friends and siblings hack accounts this way  Security Questions and Answers should be hard to guess  You can use “fake” answers to “mother’s maiden name” but you’ll need to remember what you used  Better are sites that let you create your own questions
  • 25. Pay Particular Attention to Most Important Accounts  Email is most important  “Forgot your password” link on sites goes to email  Hacker with access to email can reset all other accounts  Nearly as important is social networking  Hacker can run scams against friends and colleagues  Financial sites and shopping sites with stored credit cards, too
  • 26. Never Share or Show Passwords  Don’t write them down  Never email or text them to someone  If you tell it to someone, change the password as soon as possible  Legitimate companies NEVER ask for your account password
  • 27. INTERNET SECURITY  Get a security product for all devices:  Computers  Mobile phones  Tablets  Prevent password-stealing malware from infecting your device
  • 28. Secure Mobile Devices with a Password  Mobile apps may auto log you in to accounts  Protect access with a password on phone or tablet  Remove apps you don’t use anymore that may have credit cards or financial info store:  Shopping sites  Banking and Investment companies  Travel sites
  • 29. TO SUM UP…  Create unique passphrase (no dictionary words)  Nothing others will guess  Customize for each site  Focus on email, social, financial sites first  Use password managers  Never share or show passwords  Take action if breached  Use security software  Set passwords on mobiles