cyber crime the new war of the 21st century

Post on 09-Aug-2015

51 Views

Category:

Presentations & Public Speaking

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Crime- The New War of the 21st Century

Computer related fraud. Illegal accessment. Illegal interception. Data interference. System interference. Misuse of devices.

What is Cyber Crime ?

Types of Cyber Crime

Hacking- Illegal intrusion into a computer

system and/or network .

Unauthorized access to data

storage.

Motive behind the crime called

HACKERS:

Curiosity and/or desire to learn.

Gang mentality.

Psychological needs.

Misguided trust in other

individuals.

Destructive mindset.

Revenge and malicious reasons.

Types of Cyber Crime

Child pornography- Aggression of pedophiles. Sexual harrasement.

How do they operate- False identity. Connecting in various chat

rooms. Interacting with other

children.

Types of Cyber Crime (Cont...)

DENIAL OF SERVICE ATTACKS- Filling e-mail with spam mails. Derpriving from the original service. For

Example: The Ping of death and Tear Drop attacks.

COMPUTER VANDALISM- Destroying or damaging data rather than

stealing. Misusing a file for circulation.

Types of Cyber Crime (Cont...)

CYBER TERRORISM- DOS attacks. Hate websites or hate e-mails. Service network attacks.

SOFTWARE PIRACY- Illegal copying of genuine program. Counterfeiting and distribution of products.

Types of Cyber Crime (Cont...)

Phishing- Grabing one’s personal information to access.

Using unsolicited e-mails.

Vishing- Using social engineering and Voice Over IP.

Working out on Landline telephone service .

Types of Cyber Crime (Cont...)

Cyber Security-

Protection of sensitive information.

Prevention,detection and response to different online attacks.

Privacy Policy- Take a look before submitting anything for a site.

Keep Software Up to Date-

Installing device.

Using a valid password.

DISABLE REMOTE CONNECTIVITY-

Disabling features.

Disconnecting wireless technologies after using.

.

Use antivirus Software.

Insert Firewalls.

Uninstall unnecessary software.

Maintain backup.

Check security settings.

By exchanging information.

By building investigation capability.

By arranging regional working parties.

@

Act as a global region. Work with the law enforcing forces. Keep updated with the changing situation. Following Cyber ethics and rules.

http://www.slideshare.net/aemankhan/cybercrimeppt- 27376284

https://www.youtube.com/watch?v=C2MXuIDgGBc http://www.webcrawler.com/info.wbcrwl.net

top related