You are on page 1of 25

Ideas & Thoughts

ProtEchTion IT Academy Infrastructure Summit 2020

IT Infrastructure Summit 2020 @ BRA United High School | Page 1


Sk Sabbir Ali About Myself
Founder & CEO, ProtEchTion IT Academy

CCNSP, CCNA, MCP

Working in ProtEchTion Group since 2012 as


Founder and taking care of Web, Network and
Servers. I have expertise on Cisco Network
Router & Switches, Cyberoam (Sophos),
Juniper and Sonicwall Firewalls.

You can reach me at


sksabbirali@gmail.com
+91 91633 24055

IT Infrastructure Summit 2020 @ BRA United High School | Page 2


My Topic
Windows Security
1 Introduction

2 What is Cyber Crime?

3 History of Cyber Crime.

4 Categories of Cyber Crime

5 Types of Cyber Crime

6 Prevention.

7 Security.

8 Conclusion.

IT Infrastructure Summit 2011 | Page 3


 The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think
of be it entertainment, business, sports or
education.

 There’re two sides to a coin. Internet also has it’s


own disadvantages is Cyber crime- illegal activity
committed on the internet.

IT Infrastructure Summit 2020 @ BRA United High School | Page 4


WHAT IS CYBER CRIME?

Meaning of the Word CYBER


It is a combining form relating to information
technology, the Internet, and virtual reality.

Cyber crime, or computer related crime, is crime that involves


a computer and a network. The computer may have been used
in the commission of a crime, or it may be the target.

IT Infrastructure Summit 2020 @ BRA United High School | Page 5


Top 10 Best Hackers in World

IT Infrastructure Summit 2020 @ BRA United High School | Page 6


CATEGORIZATION OF CYBER CRIME

• The Computer as a Target

• The computer as a weapon

IT Infrastructure Summit 2020 @ BRA United High School | Page 7


Types of Cyber Crime
1. Hacking
2. Denial of Service Attacks
3. Identity theft
4. Virus Dissemination
5. Malware
6. Computer Vandalism
7. Online Fraud
8. Software Piracy
9. Phishing
10. Spam
11. Spoofing

IT Infrastructure Summit 2020 @ BRA United High School | Page 8


HACKING
Unauthorized access of Computer, Computer
Resources, Computer Network,
Telecommunication Devices, Telecommunication
Media, etc. with an intention to take the control
over the information stored in it or transmitting
through the Cyber Space

Section 65 & 66 of IT Act

IT Infrastructure Summit 2020 @ BRA United High School | Page 9


Types of Hackers

 White Hat Hacker

 Grey Hat Hacker

 Black Hat Hacker

***White Hat Hacker is known as Ethical Hacker***

IT Infrastructure Summit 2020 @ BRA United High School | Page 10


DENIAL OF SERVICE ATTACK
DDoS, or dedicated denial-of-
service, attacks drive what the
network recognizes as legitimate
traffic through your servers,
overloading the system and causing
significant slow-downs, or even
outages. DDoS attacks are often
used to silence businesses or
overwhelm a financial institution.

IT Infrastructure Summit 2020 @ BRA United High School | Page 11


IDENTITY THEFT
Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature
of any other person

Section 66C of IT Act

IT Infrastructure Summit 2020 @ BRA United High School | Page 12


VIRUS DISSEMINATION

• Malicious software that


attaches itself to other
software. (virus, worms,
Trojan Horse etc.)

IT Infrastructure Summit 2020 @ BRA United High School | Page 13


Malware
The word "malware" comes from the term
"MALicious softWARE."
Malware is any software that infects and damages a computer
system without the owner's knowledge or permission.

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 14
DANGEROUS MALWARE
 Trojan :
 Virus : • Spywar social engineering
• Melisa e
 Ransomware You are the shield
virus
:
 Worm : (Cryptolocker)
• Wannacry
• Petya
• I Love You Virus

 Botnet :
• 2007
Strom

IT Infrastructure Summit 2020 @ BRA United High School | Page 15


COMPUTER VANDALISM
• Damaging or destroying data rather than
stealing.
• Transmitting virus

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 16
Credit Card Fraud. Online users are duped into
submitting their credit card information on deceitful
Online Fraud
websites, allowing criminals to make purchases
using the stolen data.

Work-at-Home Scam. This scam promises financial


independence and huge money for minimal effort of
work at home. Victims must pay upfront for a
registration fee to get products that actually don’t
sell.

Sweepstakes Scam. The victim receives an email


saying he has won the lottery or sweepstakes. He’s
asked to send a fee to claim the bogus prize.

Online Dating Scam. Criminals scour social


networking sites to meet and form relationships
with people and later convince them to send money.

Investment Fraud, Auction Fraud, Ecommerce Fraud


and so on…………

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 17
SOFTWARE PIRACY

• Theft of software through the


illegal copying of genuine
programs.
• Distribution of products intended
to pass for the original.

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 18
Always use SSL Certified WEBSITE

https://www.protechtionindia.com
SSL- Secure Sockets Layer

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 19
Which one is fake?

Dashes not
used

1. http://signin-ebay.com/
2. https://signin.ebay.com/
"HTTPS" Periods are
S = Secure used

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 20
ATM Card Fraud and Lottery Fraud
 Committing cheating by
impersonation in the name of bank
manager or e.g. using names and
logos of reputed companies.
 A skimmer is a card reader that can
be disguised to look like part of an Skimmer
ATM. The skimmer attachment
collects card numbers and PIN codes,
which are then replicated into
counterfeit cards. Skimming is the type
of fraud that occurs when an ATM is
compromised by a skimmer. Skimmer
ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 21
PORNOGRAPHY
• Whoever publishes or transmits or
causes to be published in the
electronic form, any material which is
lascivious or appeals to the prurient
interest and for defamation of
woman/girl.

• It is punishable u/s 67/67A/67B of IT


Act and 354D/500/509 IPC which may
extent to more than 7 years.

• If morphing is made in the sexual


material then sections 67/67A/67B of
IT Act and 465/469/471/354D/500/509
IPC

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 22
SAFETY TIPS FOR CYBER
CRIME
 Use antivirus software’s.
 Insert firewalls.
 Uninstall unnecessary software
 Maintain backup.
 Check security settings.
 Stay anonymous - choose a genderless screen
name.
 Never give your full name or address to
strangers.
 Learn more about Internet privacy.
ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 23
Security

It’s like brakes on your car. You would not get into a car
without brakes or with faulty brakes. But brakes are a
safety feature, not a vehicle function that improves miles
per litter.

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 24
Password

ProtEchTion IT Academy Infrastructure Summit 2020 @ BRA United High School | Page 25

You might also like