SlideShare une entreprise Scribd logo
1  sur  23
Cyber Crime Management
by Dr. Triveni Singh
ASP, UP STF
Agenda
Major Frauds
Communication Media
Telecommunication Issue
Database Management
Legal and Regulatory Perspective
3
Major Frauds
Cheap Loans
BTS Tower
Jobs
Holidays
Fake E-Commerce Site
Insurance Frauds
5
PTI Coverage
ICICI Prudential - Mail Spoofing Case
Media Coverage
Media Coverage
Media Coverage
Media Coverage
Media Coverage
Cases
S.
No
No. of
Victims
Total No.
of Arrests
Fraud
Amount
Date Description of Work
1 1500 87 1.25 Cr 12/08/2015
ICICI Prudential Case – Spurious
Calls / Fake Calls Fraud (Mail
Spoofing)
2 17 5 1 Cr
17/01/2015
BRL Shine.com Fraud
3 76 2 60 Lac 25/03/2015 IG Naukri.Com Fraud
4 1 3 - 29/03/2015 PCS Exam Fraud
5 2500 3 4 Cr 16/04/2015 Online Billing System Fraud
Contd…
S.
No
No. of
Victim
s
Total No.
of
Arrests
Fraud
Amount
Date Description of Work
6 4560 21 23 Cr 09/05/2015 Telecom Tower Fraud
7 37 12 2.22 Cr 25/05/2015 CPMT Exam Fraud
8 5000 59 16 Cr 15/06/2015 Online Job Frauds (OTP)
9 200 1 85 Lakhs 16/01/2015 UP Sarvagramin Bank Fraud
(Phishing Site)
Contd..
S.
No
No. of
Victims
Total No.
of Arrests
Fraud
Amount
Date Description of Work
10 1 1 - 26/08/2015 Social Profile Hacked
11 7 1 35 Lacs 24/09/2015 Piracy
12 922 2 1.85 Cr 07/10/2015 Fake Jobs Racket, Basti
13 3046 83 15 Cr 14/10/2015
Laxmi Nagar, Fake Call Centre
Racket
14 247 2 5 Cr 12/09/2015
Results Manipulation, BSF Lower
Service, Lucknow
S.
No
No. of
Victims
Total No.
of Arrests
Fraud
Amount
Date Description of Work
10 300 5 50 Lakh
14th
March
2016
Cheque Cloning Case
11 5000 2 25 crore
5th
March
2016
Fake Insurance Racket
12 1 2 53 lakhs 20th
December Fake Job Racket
13 500+ 40 12 Crore
5th
January,
2016
Fake Insurance Racket
14 350+ 20 Crore
10th
December
2015
Fake Call Centre Racket
S.
No
No. of
Victims
Total No.
of Arrests
Fraud
Amount
Date Description of Work
10 125 3 53 Lakhs 10th
March 2016 Job Racket
11 5000 121 25 crore 5th
March 2016 Fake Insurance Racket
12 1 2 50 lakhs 15th
March 2016 Cheque Cloning Racket
13 20 2 18 Lakhs 6th
April, 2016 Bank of Baroda Fraud
14 350+ 8 20 Crore 13th
May 2016 Railway Job Racket
Web Site
PRI
VoIP Call
Communication Media
Mobile Phones
Land Line
VoIP
PRI Lines
Website
Paid Access
Employee
Hacking
1. Insurance Company
2. Job Portals
3. Bank
4. Tour Operators
5. Online Crawler.
Data Vendors
Darkode
Database
Database Management
•IMEI
•MAC Address
•IP address
Spoofing
Website
Payment
Gateway
(Scan Document)
Whois
No KYC
Domain
Registration
Technical Challenges
Call
SMS
Mail
Whatsapp & VoIP
Logs &
Server
Telecommunication Issues
Source Port
Destination Port
NAT Several
SDR
IP Address
VoIP Logs
Mac Filtering
Logs
IP version 4 vs IP version 6
Mac Address
Port
Different Format of Different Operators
Regulatory Issues
PPI License by RBI (Minimum KYC)
Basic (Bank account) KYC
SIM (Telecom) KYC
No Physical Verification
No Central Database
Payment Gateway KYC
Banking Database of Different
Vendors
A. IT Act 43 (A)
B. IT Act 69 (1) (Interception monitoring and Decryption
C. IT Act 67 (C)
D. IT Act 72 (A) Disclosure
E. IT Act 85
F. Company Act, 2013, Sec 477
1. Cyber Cafe Rules Implementation
2. Jurisdictional Conflict
3. MLAT/LR
Why to be serious??
A. ISO 27001
B. PCI-DSS
FIR
Fraud ManagementFraud Management
22
Thank You

Contenu connexe

En vedette

En vedette (19)

Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo HospitalsSMAC in Healthcare:   Arvind Sivaramakrishnan, CIO Apollo Hospitals
SMAC in Healthcare: Arvind Sivaramakrishnan, CIO Apollo Hospitals
 
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas TripathiPreparing for the Future Innovation in Digital Healthcare: Manas Tripathi
Preparing for the Future Innovation in Digital Healthcare: Manas Tripathi
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamicciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
ciso-platform-annual-summit-2013-Fgont-ipv6-myths-dynamic
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Краткая организационная структура
Краткая организационная структураКраткая организационная структура
Краткая организационная структура
 
Github時代のgitのはなし
Github時代のgitのはなしGithub時代のgitのはなし
Github時代のgitのはなし
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 

Similaire à Cyber Crime Management

Computer Security in Banking and bookkeeping
Computer Security in Banking and bookkeepingComputer Security in Banking and bookkeeping
Computer Security in Banking and bookkeeping
Yogi Pratama
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
chauhan323234
 
Identity as easy asLMNOP
Identity as easy asLMNOPIdentity as easy asLMNOP
Identity as easy asLMNOP
Eric Sachs
 

Similaire à Cyber Crime Management (20)

RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Real-time fraud detection
Real-time fraud detectionReal-time fraud detection
Real-time fraud detection
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Sheriff presentation to Saratoga City Council December 6th
Sheriff presentation to Saratoga City Council December 6thSheriff presentation to Saratoga City Council December 6th
Sheriff presentation to Saratoga City Council December 6th
 
Smart sms
Smart sms Smart sms
Smart sms
 
Computer Security in Banking and bookkeeping
Computer Security in Banking and bookkeepingComputer Security in Banking and bookkeeping
Computer Security in Banking and bookkeeping
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Identity as easy asLMNOP
Identity as easy asLMNOPIdentity as easy asLMNOP
Identity as easy asLMNOP
 
Identity as easy as LMNOP
Identity as easy as LMNOPIdentity as easy as LMNOP
Identity as easy as LMNOP
 
Cyber Crimes Forensics
Cyber Crimes ForensicsCyber Crimes Forensics
Cyber Crimes Forensics
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Excel vs fraud an analysis saran kumar u
Excel vs fraud an analysis   saran kumar uExcel vs fraud an analysis   saran kumar u
Excel vs fraud an analysis saran kumar u
 
Identity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable TelecomsIdentity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable Telecoms
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator Training
 
Mit1
Mit1Mit1
Mit1
 
Bsa aml protection
Bsa aml protectionBsa aml protection
Bsa aml protection
 
PRESENTATION ON MOBIKWIK AND CONSUMER ADOPTION IN MOBILE WALLET
PRESENTATION ON MOBIKWIK AND CONSUMER ADOPTION IN MOBILE WALLETPRESENTATION ON MOBIKWIK AND CONSUMER ADOPTION IN MOBILE WALLET
PRESENTATION ON MOBIKWIK AND CONSUMER ADOPTION IN MOBILE WALLET
 

Plus de Rahul Neel Mani

Plus de Rahul Neel Mani (17)

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)Mobile First Healthcare: Chris Kozup Aruba (HPE)
Mobile First Healthcare: Chris Kozup Aruba (HPE)
 
IT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh BatraIT to IoT: The Journey to Nextgen - By Rajesh Batra
IT to IoT: The Journey to Nextgen - By Rajesh Batra
 
Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...Enabling the Future of Healthcare Through Integration and Interoperability: V...
Enabling the Future of Healthcare Through Integration and Interoperability: V...
 
Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?Can India Really Achieve the Stiff Target of Digital Healthcare?
Can India Really Achieve the Stiff Target of Digital Healthcare?
 
Becoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to ThriveBecoming Future Ready: Building New Capabilities to Thrive
Becoming Future Ready: Building New Capabilities to Thrive
 
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
Who Will Manage the Growing Web: Growing Internet and Shortfall of Cybersecur...
 
Preventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical ElementsPreventing Social Engineering Attacks: The Critical Elements
Preventing Social Engineering Attacks: The Critical Elements
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Cyber Crime Management