cyber crime and security

19
Shuaib Ibrahim Adam ME. Telecommunication Engineering Nanjing University of Posts & Telecommunications CYBER CRIME & SECURITY

Upload: eng-shuaib-ibrahim

Post on 21-Apr-2017

32.729 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Cyber crime and security

Shuaib Ibrahim AdamME. Telecommunication Engineering

Nanjing University of Posts & Telecommunications

CYBER CRIME & SECURITY

Page 2: Cyber crime and security

Out Line• Introduction• Definition• History • Categories of Cyber crime• Types of Cyber Crime• Reason for Cyber crime• Security of Cyber• Advantages of Cyber Security• Prevention tips for cyber security • Conclusion

Page 3: Cyber crime and security

TO Understand

What is the CYBER CRIMES

Why we need cyber security

What are the security problems in

Cyber field

How to implement and

maintain Security of a Cyber field

around us.

Page 4: Cyber crime and security

introductionThe internet is growing rapidly. It has given rise to new

opportunities in every field we can think of be it entertainment, business, sports or education.

There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

Page 5: Cyber crime and security

definition of cyber crime• Cybercrime is nothing but where the computer used as an

object or subject of crime!• Crime committed using a computer and the internet to steal

a person’s identity!!• Illegal imports• Malicious programs

Page 6: Cyber crime and security

History of cyber crime• The first recorded cyber crime took place in 1920.• India, Japan and China, the era of modern computer,

however, began with the analytical engine of Charles Babbage.• The first spam email took place in 1976 when it was sent

out over the ARPANT. • The first virus was installed on an Apple computer in 1982

when a high school student, Rich skrenta, developed the EIK Cloner.

Page 7: Cyber crime and security

Categorization of cyber crime The Computer as a Target:-using a computer to attack

other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc.

The computer as a weapon:-using a computer to commit real world crimes. E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc. Cyber Crime regulated by Cyber Laws or Internet Laws.

Page 8: Cyber crime and security

types of cyber crime The Hacking Denial of service attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy

Page 9: Cyber crime and security

types of cyber crime

WebJacking

Page 10: Cyber crime and security

Reason for cyber crime1. Easy to Access: - The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology.2. Complex: - The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage.3. Negligence: - Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber-criminal to gain access and control over the computer system. 4. Loss of Evidence: - Loss of evidence is a very common & obvious problem as all the data are routinely destroyed.

Page 11: Cyber crime and security

security

Page 12: Cyber crime and security

What is cyber security

Cyber security is a branch of computer security specifically related to the internet.

It’s objectives is to establish rules and measure to use against attacks over the internet.

Page 13: Cyber crime and security

Advantages of Cyber securityThe cyber security will defend us from critical attacks. It helps us to browse the site, website. Internet Security process all the incoming and outgoing

data on your computer. It will defend us from hacks and virus. Application of cyber security used in our PC needs update

every week

Page 14: Cyber crime and security

Cybercrime prevention• Cybercrime prevention can be straight-forward - when

armed with a little technical advice and common sense, many attacks can be avoided. • In general, online criminals are trying to make their money

as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.

Page 15: Cyber crime and security

Safety tips for cyber crime• Use antivirus software’s.• Insert firewalls. • Uninstall unnecessary software • Maintain backup.• Check security settings.• Stay anonymous - choose a genderless screen name.• Never give your full name or address to strangers.• Learn more about Internet privacy. • Make Sure your Computer is configured securely• Choose Strong Passwords and Keep them Safe.

Page 16: Cyber crime and security

Conclusion The Computer Security is a continuous battle

◦ As computer security gets tighter hackers are getting smarter!!!

◦ Computer and information security continue to grow in importance

◦ Nobody ever said this was going to be easy!◦ Neglecting security is the worst thing you can

do!!

Page 17: Cyber crime and security

Cyber security is everyone’s responsibility

Page 18: Cyber crime and security
Page 19: Cyber crime and security