Documente Academic
Documente Profesional
Documente Cultură
1
CYBER CRIME & THEFT REPORTING
GROUP MEMBERS:
1. WAJAHAT ROLL NUMBER: 2017-EE-051
2. SAAD AHMED ROLL NUMBER: 2017-EE-061
3. KASHAN IQBAL ROLL NUMBER: 2017-EE-067
4. ISMAIL BIN ASAD ROLL NUMBER: 2017-EE-068
5. SYED UMAMA RATEEB ROLL NUMBER: 2017-EE-070
6. AAZIB AHMED ANSARI ROLL NUMBER: 2017-EE-078
7. MIRZA HAMZA UMER ROLL NUMBER: 2017-EE-079
2
CYBER CRIME & THEFT REPORTING
CYBER CRIME
&
THEFT REPORTING
3
CYBER CRIME & THEFT REPORTING
CONTENTS:
INTRODUCTION TO CYBER CRIME.
IDENTITY THEFT.
SOCIAL ENGINEERING.
CYBERSTALKING.
SCAMMING.
4
CYBER CRIME & THEFT REPORTING
ACKNOWLEDGMENT:
In performing my assignment, we had to take the help and
guideline of some respected persons, who deserve our greatest gratitude.
The completion of this assignment gives us much Pleasure. We would
like to show our gratitude to ENGINEER TAZEEN, Technical Report
Writing & Presentation Skills Teacher, of SIR SYED UNIVERSITY
OF ENGINEERING & TECHNOLOGY
5
CYBER CRIME & THEFT REPORTING
6
CYBER CRIME & THEFT REPORTING
FRAUD:
FRAUD PREVENTION:
It is vital to an organization, large or small, to have a fraud prevention plan
in place. The fraud cases studied in the ACFE 2014 Report revealed that the
fraudulent activities studied lasted an average of 18 months before being
detected. Imagine the type of loss your company could suffer with an employee
committing fraud for a year and a half. Luckily, there are ways you can
minimize fraud occurrences by implementing different procedures and controls.
7
CYBER CRIME & THEFT REPORTING
Fraud perpetrators often display behavioral traits that can indicate the
intention to commit fraud. Observing and listening to employees can help you
identify potential fraud risk. It is important for management to be involved with
their employees and take time to get to know them. Often, an attitude change
can clue you into a risk. This can also reveal internal issues that need to be
addressed. For example, if an employee feels a lack of appreciation from the
business owner or anger at their boss, this could lead him or her to commit
fraud as a way of revenge. Any attitude change should cause you to pay close
attention to that employee. This may not only minimize a loss from fraud but
can make the organization a better, more efficient place with happier
employees. Listening to employees may also reveal other clues. Consider an
employee who has worked for your company for 15 years that is now working
65 hours a week instead of 40 because two co-workers were laid off. A
discussion with the employee reveals that in addition to his new, heavier
workload, his brother lost his job and his family has moved into the employee’s
house. This could be a signal of potential fraud risk. Very often and
unfortunately, it’s the employee you least expect that commits the crime. It is
imperative to know your employees and engage them in conversation.
8
CYBER CRIME & THEFT REPORTING
9
CYBER CRIME & THEFT REPORTING
5. HIRE EXPERTS:
A positive work environment can prevent employee fraud and theft. There
should be a clear organizational structure, written policies and procedures and
fair employment practices. An open-door policy can also provide a great fraud
prevention system as it gives employees open lines of communication with
management. Business owners and senior management should lead by example
and hold every employee accountable for their actions, regardless of position.
IDENTITY THEFT:
10
CYBER CRIME & THEFT REPORTING
Take note of these eight types of identity theft and protect yourself.
11
CYBER CRIME & THEFT REPORTING
police will be looking for the name of the person on the driver's license. The
victim's driving record now includes these driving-related offenses, which can
lead to having a revoked or suspended driver’s license. These offenses can affect
current car insurance rates, or any attempt to obtain new car insurance.
12
CYBER CRIME & THEFT REPORTING
victim’s medical history. Erroneous entries could lead to incorrect diagnosis and
other complications.
BOTNETS:
13
CYBER CRIME & THEFT REPORTING
1. EMAIL SPAM:
Though email is seen today as an older vector for attack, spam botnets are
some of the largest in size. They are primarily used for sending out spam
messages, often including malware, in towering numbers from each bot. The
Cutwail botnet for example, can send up to 74 billion messages per day.
They are also used to spread bots to recruit more computers to the botnet.
2. DDOS ATTACKS:
Leverages the massive scale of the botnet to overload a target network or
server with requests, rendering it inaccessible to its intended users. DDoS
attacks target organizations for personal or political motives or to extort
payment in exchange for ceasing the attack.
14
CYBER CRIME & THEFT REPORTING
3. FINANCIAL BREACH:
Includes botnets specifically designed for the direct theft of funds from
enterprises and credit card information. Financial botnets, like the ZeuS
botnet, have been responsible for attacks involving millions of dollars stolen
directly from multiple enterprises over very short periods of time.
4. TARGETED INTRUSIONS:
Smaller botnets designed to compromise specific high-value systems of
organizations from which attackers can penetrate and intrude further into the
network. These intrusions are extremely dangerous to organizations as
attackers specifically target their most valuable assets, including financial
data, research and development, intellectual property, and customer
information.
RANSOMWARE:
Ransom malware, or ransomware, is a type of malware that prevents users
from accessing their system or personal files and demands ransom payment in
order to regain access. The earliest variants of ransomware were developed in
the late 1980s, and payment was to be sent via snail mail. Today, ransomware
authors order that payment be sent via cryptocurrency or credit card.
TYPES OF RANSOMWARE:
There are three main types of ransomware, ranging in severity from mildly
off-putting to Cuban Missile Crisis dangerous. They are as follows:
1. SCAREWARE:
Scareware, as it turns out, is not that scary. It includes rogue security
software and tech support scams. You might receive a pop-up message claiming
that malware was discovered and the only way to get rid of it is to pay up. If
15
CYBER CRIME & THEFT REPORTING
you do nothing, you’ll likely continue to be bombarded with pop-ups, but your
files are essentially safe.
A legitimate cybersecurity software program would not solicit customers in this
way. If you don’t already have this company’s software on your computer, then
they would not be monitoring you for ransomware infection. If you do have
security software, you wouldn’t need to pay to have the infection removed—
you’ve already paid for the software to do that very job.
2. SCREEN LOCKERS:
Upgrade to terror alert orange for these guys. When lock-screen ransomware
gets on your computer, it means you’re frozen out of your PC entirely. Upon
starting up your computer, a full-size window will appear, often accompanied
by an official-looking FBI or US Department of Justice seal saying illegal
activity has been detected on your computer and you must pay a fine. However,
the FBI would not freeze you out of your computer or demand payment for
illegal activity. If they suspected you of piracy, child pornography, or other
cybercrimes, they would go through the appropriate legal channels.
3. ENCRYPTING RANSOMWARE:
This is the truly nasty stuff. These are the guys who snatch up your files and
encrypt them, demanding payment in order to decrypt and redeliver. The reason
why this type of ransomware is so dangerous is because once cybercriminals
get ahold of your files, no security software or system restore can return them to
you. Unless you pay the ransom—for the most part, they’re gone. And even if
you do pay up, there’s no guarantee the cybercriminals will give you those files
back.
CYBERBULLYING:
16
CYBER CRIME & THEFT REPORTING
CYBERBULLYING IN PAKISTAN:
17
CYBER CRIME & THEFT REPORTING
With over 100 million users of smart phones in Pakistan, Pakistan has been
included in the list of the fastest growing countries that are using internet which
only open the doors for the fact that cyber bullying is increasing as well, yet
there isn’t any legislation for cyber crimes in Pakistan. However, if you know
someone being bullied online or are a victim yourself, here’s what you need to
do.
18
CYBER CRIME & THEFT REPORTING
Simply write down your application (in English or in Urdu), narrate your
complete problem, provide as much evidences, details as you can and send it to
FIA National Response Center for Cyber Crimes(NR3C).
19
CYBER CRIME & THEFT REPORTING
The IC3 accepts online Internet crime complaints from either the actual
victim or from a third party to the complainant. Check out their website to see
how to report.
20
CYBER CRIME & THEFT REPORTING
021-35682222.
4. SNAPSHOT ON SNAPCHAT:
If your account is being misused or hacked, you can submit a report by
filling in the harassment form available on the official website. It’s that simple!
21
CYBER CRIME & THEFT REPORTING
22
CYBER CRIME & THEFT REPORTING
SOCIAL ENGINEERING:
In order to replicate itself, a virus must be permitted to execute code and
write to memory. For this reason, many viruses attach themselves to executable
files that may be part of legitimate programs .If a user attempts to launch an
infected program, the virus' code may be executed simultaneouslyThis makes it
possible to create a file that is of a different type than it appears to the user. For
example, an executable may be created and named "picture.png.exe", in which
the user sees only "picture.png" and therefore assumes that this file is a digital
image and most likely is safe, yet when opened, it runs the executable on the
client machine.
COMPUTER VIRUSES:
A COMPUTER VIRUS is a type of malware that, when
executed, replicates itself by modifying other computer programs and inserting
its own code. When this replication succeeds, the affected areas are then said to
be "infected" with a computer virus.
A virus is a computer program that can copy itself and infect a computer.
Viruses can be transmitted through internal networks, the internet or through a
usb drive.
23
CYBER CRIME & THEFT REPORTING
3. BROWSER HIJACKER:
Ever faced a problem where the homepage of your web page gets
automatically directed to a particular site? Well, that is the most common way
by which this ransomware hijacks your browser.
4. RESIDENT VIRUS:
After inserting itself directing into the memory of your system, this virus has
the capability to take a number of actions. One of its more troublesome features
24
CYBER CRIME & THEFT REPORTING
is its ability to run away. Leaving behind the file which was originally infected,
this virus has the ability to run on its own.
7. MACRO VIRUS:
Appearing in the form of a word document which seemingly links the user to
pop up ads websites, Melissa is one of the most known Micro Virus. Going one
step further, this virus not only exploits the user but also his/her friends by
mailing the copies of the infected virus document to the contact list.
25
CYBER CRIME & THEFT REPORTING
3. ANTI-VIRUS BASICS:
It’s important to have a quality anti-virus installed on your Windows
computer. While a good anti-virus is important, having more than one is a very
bad idea. Anti-virus applications are only effective when they have up-to-date
definitions of what a virus is. For this reason, be sure your anti-virus program
updates automatically and at a reasonable time (not 3am on Wednesday
nights…. not likely that your computer will be turned on during that time).
26
CYBER CRIME & THEFT REPORTING
Some people send viruses to their friends and not even know that they did
it. At Altitude Integrations, we encounter many situations where our clients
have had their email accounts hacked. Once hacked, the hacker will sometimes
use that account to send malicious content to the entire address book list.
WHAT IS CYBERSTALKING ?
Cyberstalking is the use of the Internet or other electronic means to stalk or
harass an individual, group, or organization.
It may include false accusations, defamation, slander and libel. It may also
include monitoring, identity theft, threats, vandalism, solicitation for sex, or
gathering information that may be used to threaten, embarrass or harass.
27
CYBER CRIME & THEFT REPORTING
CYBERSTALKING AN OFFENCE ?
Cyberstalking is a criminal offense under various state anti-stalking, slander
and harassment laws. A conviction can result in a restraining order, probation,
or criminal penalties against the assailant, including jail.
28
CYBER CRIME & THEFT REPORTING
information or meeting in person and report any activity that makes you feel
uncomfortable to the site’s administrators.
29
CYBER CRIME & THEFT REPORTING
Another option is to use the Tor browser. This also encrypts your traffic,
although it may raise flags for law enforcement agencies as it’s commonly used
by criminals themselves. For the ultimate in privacy and anonymity, you
can combine Tor and a VPN. Note that it’s not recommended you use a web
proxy or a free VPN service, as these can often harm your online security more
than they help it.
30
CYBER CRIME & THEFT REPORTING
WHAT IS SCAMMING?
“a confidence game or other fraudulent scheme, especially for making
a quick profit; swindle.”
Scams occur regularly when someone tries to gain access to your personal
information or get money from you.
Scammers will use certain tools to try and trick you, and they often do so
through the mail, online, in person, or over the phone.
Identifying Scams
31
CYBER CRIME & THEFT REPORTING
32
CYBER CRIME & THEFT REPORTING
33
CYBER CRIME & THEFT REPORTING
SOFTWARE PIRACY:
Software piracy is the illegal copying, distribution, or use of software. It is
such a profitable "business" that it has caught the attention of organized crime
groups in a number of countries. According to the Business Software Alliance
(BSA), about 36% of all software in current use is stolen. Software piracy
causes significant lost revenue for publishers, which in turn results in higher
prices for the consumer.
1. SOFTLIFTING:
Borrowing and installing a copy of a software application from a colleague.
2. CLIENT-SERVER OVERUSE:
Installing more copies of the software than you have licenses for.
3. HARD-DISK LOADING:
Installing and selling unauthorized copies of software on refurbished or new
computers.
4. COUNTERFEITING:
Duplicating and selling copyrighted programs.
5. ONLINE PIRACY:
Typically involves downloading illegal software from peer-to-peer network,
Internet auction or blog.
34
CYBER CRIME & THEFT REPORTING
1. LEGAL PROTECTION:
Most companies make sure their software is protected legally by a user
agreement. Letting consumers know that making unauthorized copies is against
the law will help prevent people from unknowingly breaking piracy laws.
2. PRODUCT KEY:
The most popular anti-piracy system is a product key, a unique combination
of letters and numbers used to differentiate copies of the software. A product
key ensures that only one user can use the software per purchase.
35
CYBER CRIME & THEFT REPORTING
3. TAMPERPROOFING:
Some software programs have built-in protocols that cause the program to
shut down and stop working if the source code is tampered with or modified.
Tamperproofing prevents people from pirating the software through the
manipulation of the program's code.
4. WATERMARKING:
Company logos, or names are often placed on software interfaces to indicate
that products are legitimately obtained, and are not illegal copies.
CONCLUSION:
Though not all people are victims to cyber crimes, they are still at risk.
Crimes by computer vary, and they don’t always occur behind the computer,
but they executed by computer. The hacker’s identity is ranged between 12
years young to 67years old. The hacker could live three continents away from
its victim, and they wouldn’t even know they were being hacked. Crimes done
behind the computer are the 21st century’s problem. With the technology
increasing, criminals don’t have to rob banks, nor do they have to be outside in
order to commit any crime. They have everything they need on their lap. Their
weapons aren’t guns anymore; they attack with mouse cursors and passwords.
36