cyber crime & security prepared by : rughani zarana

23
Cyber crime & Security Prepared by : Rughani Zarana

Upload: mervin-hancock

Post on 28-Dec-2015

226 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Cyber crime & Security Prepared by : Rughani Zarana

Cyber crime&

Security

Prepared by : Rughani Zarana

Page 2: Cyber crime & Security Prepared by : Rughani Zarana

What is cyber security? Cyber security standards are security standards which enable

organizations to practice safe security techniques to minimize the number of successful cyber security attacks.

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.

Though, cyber security is important for network, data and application security.

Page 3: Cyber crime & Security Prepared by : Rughani Zarana

What is…? Communication security-protecting organization

communication media , technology , and content.

Network security-is the protection of networking components, connection and content.

Information security-protection of information and its critical elements , including the systems and hardware that use , store or transmit that information.

Page 4: Cyber crime & Security Prepared by : Rughani Zarana

What is cyber crime?

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

Page 5: Cyber crime & Security Prepared by : Rughani Zarana

History The first cyber crime was recorded in the year

1820.

The first spam email took place in 1978 when it was sent over the Arpanet.

The first Virus was installed on an Apple Computer in 1982.

Page 6: Cyber crime & Security Prepared by : Rughani Zarana

Cyber crimes includes

Illegal access Illegal Interception System Interference Data Interference Misuse of devices Fraud

Page 7: Cyber crime & Security Prepared by : Rughani Zarana

Types of Cyber attacks, by percentage (source- FBI)

Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71% Employee abuse of internet privileges 79% Viruses: 85%

Page 8: Cyber crime & Security Prepared by : Rughani Zarana

Categorize of Cybercrime

The Computer as a Target :using a computer to attack other

computers. The computer as a weapon :

using a computer to commit real world crimes.

Page 9: Cyber crime & Security Prepared by : Rughani Zarana

Types of cyber crime

HACKINGDENIAL OF SERVICE ATTACKVIRUS DISSEMINITIONCOMPUTER VANDALISMCYBER TERRORISMSOFTWARE PIRACY

Page 10: Cyber crime & Security Prepared by : Rughani Zarana

Hacking

Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING.

Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.

Page 11: Cyber crime & Security Prepared by : Rughani Zarana

DENIAL OF SERVICE ATTACK

This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Page 12: Cyber crime & Security Prepared by : Rughani Zarana

VIRUS DISSEMINITION

Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks.

(virus, worms, Trojan Horse, web jacking, e-mail bombing etc).

Page 13: Cyber crime & Security Prepared by : Rughani Zarana

COMPUTER VANDALISM

Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate .

Page 14: Cyber crime & Security Prepared by : Rughani Zarana

CYBER TERRORISM

Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc.

Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

Page 15: Cyber crime & Security Prepared by : Rughani Zarana

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Page 16: Cyber crime & Security Prepared by : Rughani Zarana

Why should we care? It is a criminal activity committed on the internet.

Cyber crime-Where computer is either a tool or target or both.

Page 17: Cyber crime & Security Prepared by : Rughani Zarana

How can we protect? Read Privacy policy carefully when you submit

the data through internet.

Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.

Disable remote connectivity.

Page 18: Cyber crime & Security Prepared by : Rughani Zarana

Advantage of cyber security It will defend from hacks and virus.

The application of cyber security used in our PC needs update every week.

The security developers will update their database every week once. Hence the new virus also deleted.

Page 19: Cyber crime & Security Prepared by : Rughani Zarana

Safety tips …

Use antivirus software Insert firewalls , pop up blocker Uninstall unnecessary software Maintain backup Check security settings Use secure connection Open attachments carefully Use strong passwords , don’t give personal information

unless required

Page 20: Cyber crime & Security Prepared by : Rughani Zarana

CYBER LAW OF INDIA Cyber crime can involve criminal activities

that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.

The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.

Page 21: Cyber crime & Security Prepared by : Rughani Zarana

ConclusionThe only system which is truly secure is

one which is switched off and unplugged.

So , only way to be safe is Pay attention and Act smart.

Page 22: Cyber crime & Security Prepared by : Rughani Zarana
Page 23: Cyber crime & Security Prepared by : Rughani Zarana

THANK YOU