cyber crime and social media security

38
Cyber Crime - Prime College

Upload: hem-pokhrel

Post on 18-May-2015

1.154 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Cyber Crime and Social Media Security

Cyber Crime - Prime College

Page 2: Cyber Crime and Social Media Security

Presenter’s Profile

Hem Sagar Pokhrel

MSP 2013

Prime College

Volunteer, Youth Action Nepal

Anamnagar, Kathmandu-Nepal

@NepaliSagar

www.facebook.com/

geeksagar

Page 3: Cyber Crime and Social Media Security

WHAT IS CYBER CRIME ?

Computer crime or cybercrime is a

form of crime where the Internet or

computers are used as a medium to

commit crime.

Page 4: Cyber Crime and Social Media Security

National Research Council,

"Computers at Risk",

1991.

"The modern thief can steal more with

a computer than with a gun.

Tomorrow's terrorist may be able to do

more damage with a keyboard than

with a bomb".

Page 5: Cyber Crime and Social Media Security

TYPES OF CYBER CRIME

1. Cybercrimes against

persons.

2. Cybercrimes against

property.

3. Cybercrimes against

government.

Page 6: Cyber Crime and Social Media Security

1.AGAINST PERSON

Includes various harassment of anyone

with the use of a computer such as e-

mail.

E.g.:- The Melissa virus first appeared on the internet

in March of 1999. It spread rapidly throughout

computer systems in the United States and Europe. It

is estimated that the virus caused 80 million dollars in

damages to computers worldwide.

Page 7: Cyber Crime and Social Media Security

AGAINST PERSON contd..

oCyber harassment is a distinct Cybercrime.

oHarassment can be sexual, racial, religious, or other.

Persons perpetuating such harassment are also guilty

of cybercrimes.

oCyber harassment as a crime also brings us to

another related area of violation of privacy of citizens.

oNo one likes any other person invading the

invaluable and extremely touchy area of his or her

own privacy which the medium of internet grants to

the citizen.

Page 8: Cyber Crime and Social Media Security

2.AGAINST PROPERTY

Include computer vandalism (destruction of others' property), transmission of harmful programmes.

E.g. : A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.

Page 9: Cyber Crime and Social Media Security

3.AGAINST GOVERNMENT

An individual "cracks" into a

government or military maintained

website or systems.

This crime manifests itself into

terrorism .

E.g. Group like LUZSEC Anonymous

Page 10: Cyber Crime and Social Media Security

Why learn about CYBER CRIME ?

Everybody is using COMPUTERS.

New generation is growing up with computers

Terrorist targeted the teenagers.

Conventional crimes like Forgery,, extortion,,

kidnapping are being committed with the help

of computers.

MOST IMPORTANT - Monetary transactions

are moving on to the INTERNET

Page 11: Cyber Crime and Social Media Security

IN SHORT

Cyber CRIME is any

crime where Computer is

a target. Computer is a tool of

crime Computer is incidental

to crime

Page 12: Cyber Crime and Social Media Security

VICTIMS

Desperados and greedy

people

Unskilled &

Inexperienced

Unlucky people

Page 13: Cyber Crime and Social Media Security

Hacker and Cracker

A Hacker is a person who just wants to know the

inner workings of computer systems, helping to

improve them if they detect flaws in their security. 

A Cracker is a person with high skills in computer

systems (the same way that hackers), these skills are

regularly used for personal benefit or for harm.

Page 14: Cyber Crime and Social Media Security

HACKING Illegal intrusion into a computer system without

the permission of the computer owner/user.

Types1. Ethical hacking &2. Non- ethical hacking

Page 15: Cyber Crime and Social Media Security

VIRUS DISSEMINATION

Malicious software that

attaches itself to other

software.e.g.:-1. Virus, worms, 2. Trojan Horse, 3. Time bomb,4. Logic Bomb,

Page 16: Cyber Crime and Social Media Security

SOFTWARE PRIVACY

Theft of software through the illegal copying

of genuine programs or the counterfeiting

and distribution of products intended to pass

for the original.

Retail revenue losses worldwide are ever

increasing due to this crime Can be done in

various ways

E.g.:-End user copying, Hard disk loading,

Counterfeiting,

Illegal downloads from the internet etc.

Page 17: Cyber Crime and Social Media Security

INTERNET RELAY CHAT

Internet Relay Chat (IRC) servers have chat

rooms in which people from anywhere the

world can come together and chat with each

other.

Criminals use it for meeting co-conspirators.

Hackers use it for discussing their exploits /

sharing the techniques.

Page 18: Cyber Crime and Social Media Security

DDOS ATTACK

malicious action typically taken against a

computer system such as a server or

webpage host.  Server Flooding is achieved by causing a

server to attempt to respond to an excessive number of users simultaneously

Server crashing is typically achieved through a malicious piece of software that uses a flaw or weakness in the server programming to cause the server to crash and be inaccessible until restarted.

Page 19: Cyber Crime and Social Media Security

Email Bombing

Form of denial of service attack that floods

an inbox and mail server with messages.

This type of attack can be a nuisance on a

low level, but it can also become a serious

problem. 

There are a variety of techniques that can be

used to address email bombing. Maintaining -multiple email addresses for different activities can help.

Page 20: Cyber Crime and Social Media Security

NET EXTORTION

Copying the company’s

confidential data in order to

extort paid company for huge

amount.

Page 21: Cyber Crime and Social Media Security

CYBER DEFAMATION

The Criminal sends emails containing

defamatory matters to all concerned off the

victim or post the defamatory matters on a

website..

E.g.:-(disgruntled employee may do this

against boss,, ex-boys friend against girl,,

divorced husband against wife etc.)

Page 22: Cyber Crime and Social Media Security

PHISHING

It is technique of pulling out

confidential information from

the bank/financial

institutional account holders

by deceptive means.

Page 23: Cyber Crime and Social Media Security

PHISHINGIt is technique of pulling out confidential

information from the bank/financial institutional

account holders by deceptive means.

Page 24: Cyber Crime and Social Media Security

PHISHINGIt is technique of pulling out confidential

information from the bank/financial institutional

account holders by deceptive means.

Page 25: Cyber Crime and Social Media Security

How to be secure then .???

1. Enabled the “Always use HTTPS” setting for

Facebook, Twitter, Outlook, Gmail, Google and all the

other online services.

2. Offers via an unknown person or offers that are too good

to be true should be suspect.  

3. Don’t click the links in emails. Always go to the

source or manually type in the address in your web

browser.

4. Don’t use a debit card online. If your debit card is

compromised that’s money out of your bank account.

Credit cards provide more protection and less liability.

Page 26: Cyber Crime and Social Media Security

How to be secure then .???

5. Secure your PC. Update your critical security patches

and anti-virus and only shop from a secured Internet

connection.

6. Change your password often and use combination

of Uppercase, Lowercase, Special characters and

characters as password. 

Page 27: Cyber Crime and Social Media Security

CYBER CRIME AND

SOCIAL MEDIA

Page 28: Cyber Crime and Social Media Security

Do take advantage of privacy settings and

encourage your friends to do the same

Do ask questions before clicking a link.

Do accept friend requests with caution. D

Don’t include too much identifying information.

Don’t automatically trust everyone.

Facebook Security

Page 29: Cyber Crime and Social Media Security

Stay Updated

Secure Web Hosts

Moderate the comment

Backups

Twitter Security

Page 30: Cyber Crime and Social Media Security

Never share personal

information

Don’t be too specific

Link your twitter account

Don’t spit excessive personal

information, this is about as

dangerous on any other social

network. if necessary.

Twitter Security Don’t tweet about moving

servers, changing passwords or any other type of situation where your security could be compromised more easily.

Review applications that use your twitter account with other networking sites like Facebook only

Page 31: Cyber Crime and Social Media Security

 

•Stay Updated

•Secure Web Hosts

•Moderate the comment

•Backups

How To Secure Your Blog

Page 32: Cyber Crime and Social Media Security

 

Malware bytes' Anti-

Malware

True Crypt

CCleaner

Flash Cookie Remover

Offline Protection

Page 33: Cyber Crime and Social Media Security

Security Tips | Smartphone Users

Install anti-virus software, and keep it

updated.

Use a PIN code or pattern lock on your phone.

Turn off geo-tagging, or turn off photo auto-

uploads.

Avoid location "check-ins.“

Don't store passwords on the phone.

Enable remote 'wiping' of data.

Encrypt public Wi-Fi transmissions.

Page 34: Cyber Crime and Social Media Security

Our Expectation Now Onwards

Conscious about Electronic Transaction act 2064

Don't edit images in unwanted manner and also do

not like, share ,tag and post such edited images in

any Social Networking sites.

Do not keep multi accounts of same sites | delete if

you already have.

Use privacy setting to avoid cyber theft.

Hide your Geographical Location as far as

practicable.

Page 35: Cyber Crime and Social Media Security
Page 36: Cyber Crime and Social Media Security
Page 37: Cyber Crime and Social Media Security

References

facebook.com/security

fass10012041.wordpress.com

forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-

DNS

en.wikipedia.org/wiki/

f-secure.com/weblog/

totaldefense.com/securityblog.aspx

twitter.com/safety

Page 38: Cyber Crime and Social Media Security

THANK YOU