Full Transcript

Cybercrime What is Cybercrime Cybercrime is a criminal activity that either targets or uses a computer, a computer network or a networked device. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers. Lecture 2 2 The Growth of Cyberc...

Cybercrime What is Cybercrime Cybercrime is a criminal activity that either targets or uses a computer, a computer network or a networked device. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers. Lecture 2 2 The Growth of Cybercrime  Cybercrime is growing as use of the internet and business networks expand. Today, more than ever, businesses of all sizes rely on their networks, data and internet connectivity to conduct business.  As businesses store more of their and their customers' data online, they are becoming increasingly vulnerable to cyber thieves.  Companies lost $1.8 billion to cybercrime in 2019. Big companies with a big online presence are heavily targeted. Lecture 2 3 Common Cybercrime Types A. Malware B. Social Engineering (Phishing, Vishing, Pretexting and Baiting) C. Spamming D. Pharming E. Prohibited / Illegal Content F. Cyberstalking Lecture 2 4 A. Malware  A general term for malicious software, including viruses that may be installed or executed without your knowledge.  The code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other "bad" or illegitimate action on data or networks. Lecture 2 5 A. Malware – Types 1. Spyware: a software that aims to gather information about a person or organization, sometimes without their knowledge. 2. Adware: a software that generates revenue for its developer by automatically generating online advertisements on the user interface of the software or on a screen. Lecture 2 6 A. Malware – Types Ransomware: a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Ransomware are often paid via Bitcoin Bitcoin is a virtual currency or a digital currency - is a type of money that is completely virtual. It's like an online version of cash. This allows cybercriminals to receive funds with a high degree of anonymity, making transactions difficult to track Lecture 2 7 A. Malware – Types (cont.) 4. Trojan Horse: any malicious computer program that misleads users of its true intent. 5. Computer Worm: a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Lecture 2 8 A. Malware – Types (cont.) 6. Keystroke Logging: often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, so that the person using the keyboard is unaware that his actions are being monitored. 7. Computer Virus: a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. Lecture 2 9 Can Malware harm Computer hardware? As a computer virus is only code, it cannot physically damage computer hardware. However, it can create scenarios where hardware or equipment controlled by computers is damaged. For example, a virus may instruct your computer to turn off the cooling fans, causing your computer to overheat and damage its hardware. Lecture 2 10 A. Malware (cont.) Some Signs of active malware  Your computer is slowing down.  Internet traffic suspiciously increases  Popup Ads Start Popping Up Everywhere.  Your Browser Keeps Getting Redirected.  An Unknown App Sends Scary Warnings.  Mysterious Posts Appear on Your Social Media.  Your Browser homepage changed without your input.  Your System Tools Are Disabled.  Everything Seems Perfectly Normal. Lecture 2 11 A. Malware – Commonly Encountered CovidLock (2020) This type of ransomware infects victims via malicious files promising to offer more information about the disease. The problem is that, once installed, CovidLock encrypts data from Android devices and denies data access to victims. To be granted access, you must pay a ransom of USD 100 per device. WannaCry (2017) A virus that takes over your computer (or cloud files) and holds them hostage. ILOVEYOU (2000) Sending a bogus “love letter” that looks like a harmless text file. The virus aims to steal passwords Lecture 3 12 B. Social Engineering It is the act of manipulating the user and tricking him to provide his most confidential data voluntarily. Often referred to by “Hacking Humans” Examples Asking someone to use his computer to print something “Quickly”. Leaving on someone’s desk a USB that contains spyware Lecture 2 13 B. Social Engineering (cont.) Some of the tools used by social engineering are 1. Phishing 2. Vishing (voice phishing) 3. Pretexting 4. Baiting Lecture 2 14 B. Social Engineering – Phishing  Use shortened or misleading links that redirect users to suspicious websites that host phishing landing pages. Phishin g Lecture 2 15 B. Social Engineering – (cont.) Phishing Example of phishing emails Malicious link! Lecture 2 16 B. Social Engineering – Vishing Urgent Voice mails to convince the victims that they need to act quickly to protect themselves from risk or other asking for help. Example: https://www.youtube.com/watch? v=xuYoMs6CLEw Lecture 2 17 B. Social Engineering – Pretexting Attackers focus on creating a good pretext, or a fabricated scenario, that they use to try and steal their victims’ personal information. The scammer usually says they need certain bits of information from their target to confirm their identity but they actually steal that data and use it to commit identity theft or stage secondary attacks. Identity Theft is the forging of someone’s identity for the purpose of fraud. Lecture 2 18 B. Social Engineering – Baiting Involves offering something enticing to an end user, in exchange for login information or private data. Baiting forms Digital: Sending an email such as you have won a prize Physical: leaving a USB with an interesting label on a desk Lecture 2 19 B. Social Engineering – Baiting Example Lecture 2 20 C. Spamming Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes. It can be sent in massive volume by botnets, networks of infected computers. Spam s Lecture 2 21 D. Pharming  Criminal act of producing a fake website and then redirecting users to it.  An example of pharming would be if a user opens his browser and enters the web address of his bank in order to complete a transaction in online banking. However, he is redirected to a fraudulent site that looks like the bank's website. Lecture 2 22 E. Prohibited / Illegal Content Prohibited content might include materials which encourage violence, criminal behavior or dangerous behavior (e.g. creating weapons, taking or making drugs and carrying out fraudulent or terrorist acts) or inappropriate material. Lecture 2 23 F. Cyber Stalking Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact, monitoring, making threats, damage to data or equipment. Lecture 2 24 Who are the possible threats?  Computer criminal types  Employees  Crackers (Black-hat Hackers)  Terrorists  Yourself – by behaving recklessly on social media, internet or even your personal files could unintentionally harm you. E.g. sending a personal image to a work group.  White-hat Hackers are also known as ethical hackers, experts who attempt to exploit a system or a network to identify its weakness with the permission of the system owner. Lecture 2 25 Cases of cyber-attacks in Saudi Arabia Cyber-attack against state-owned oil company Aramco. Over 30,000 computers at Saudi Arabian oil company Aramco were hit by a devastating virus in August 2012. The attack destroyed data and erased hard-drives of computers and is thought to have been aimed at stopping the production of oil ( world exchange report, 2013). The Official Website of King Saud University (KSU) got hacked by some unknown hackers. Database of 812 users hacked from http://printpress.ksu.edu.sa/ and dumped on Internet by hackers on a file sharing site including Mail address list, mobile phones and passwords (thehackernews.com, 2012). Lecture 2 26 Cybercrime Law In Saudi Arabia The Saudi Anti-Cyber Crime Law aims to secure the safe exchange of data, protect the rights of users of the computers and the internet, and to protect the public interest and morals as well as people's privacy. Lecture 2 27 Reporting Cybercrime in Saudi Arabia Access the portal of the Ministry of the Interior (Abshar). Access the Public Security Services. Select the cybercrime report. Select the report, Fill in the required columns. After submitting the report, a reference number will be assigned to the report. Lecture 2 28

Use Quizgecko on...
Browser
Browser