cyber crimes and security

25
By: Cyber Crimes And Security Ibtsam Rana And Ali Kainth

Upload: ibtsam-rana

Post on 21-Feb-2017

37 views

Category:

Education


1 download

TRANSCRIPT

Page 1: Cyber crimes and security

By:

Cyber CrimesAnd

Security

Ibtsam RanaAnd

Ali Kainth

Page 2: Cyber crimes and security

Cyber CrimeWhat is Cyber ???

"Cyber" is a prefix used to describe a person, thing, or idea as part of the computer and information age.

What is Cyber Crime ???

Cybercrime, also called computer crime, is any illegal activ-ity that involves a computer or network-connected device, such as a mobile phone.

Page 3: Cyber crimes and security

• The first recorded cyber crime was recorded in the year 1820.• The first spam email took place in 1978 when it was sent over the Arpanet.• The first Virus was installed on an Apple Computer in 1982.

Cyber Crime

History

Page 4: Cyber crimes and security

Cyber Crime

Categorize of Cybercrime

• The Computer as a Target : using a computer to attack other computers. • The computer as a weapon : using a computer to commit real world crimes.

Page 5: Cyber crimes and security

Cyber CrimeTypes of Cybercrime

• HACKING• CHILD PORNOGRAPHY• DENIAL OF SERVICE ATTACK• VIRUS DISSEMINITION• COMPUTER VANDALISM• CYBER TERRORISM• SOFTWARE PIRACY

Page 6: Cyber crimes and security

Who are Hackers???In common a hacker is a person who breaks into computers, usu-

ally by gaining access to administrative controls.

Types of Cybercrime

What is Hacking ???

Unauthorized access of any System is called hacking.

Page 7: Cyber crimes and security

Types of hackers

• Black hat hackers• White hat hackers• Gray hat hackers

Page 8: Cyber crimes and security

Types of Cybercrime3. DENIAL OF SERVICE ATTACK( DoS Attacks)

Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, Trojan Horse, web jacking etc. are examples)

4. VIRUS DISSEMINITION

This is an act by the criminal, who floods the bandwidth of the victims net-work or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide

Page 9: Cyber crimes and security

Cyber Threat Evolution

Page 10: Cyber crimes and security

Types of Cybercrime

5. COMPUTER VANDALISM

Computer vandalism is a type of malicious behavior that involves damages computers and data in various ways and potentially disrupting businesses. Typical computer vandalism involves the cre-ation of malicious programs and damage the password or hard disk.

6. CYBER TERRORISM

Cyber terrorism is the terrorism using internet, computer or electronic things. In this way terrorists shares hate data over the internet or share wrong information. A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption.

Page 11: Cyber crimes and security

Types of Cybercrime

7. SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Page 12: Cyber crimes and security

CyberSecurity

Page 13: Cyber crimes and security

Cyber SecurityWhat is Cyber Security???

Cyber security refers to the technologies and processes de-signed to protect computers, networks and data from unautho-rized access and attacks delivered via the Internet by cyber criminals.

Page 14: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

Virus

Hacker

Malware

Trojan horses

Password cracking

Page 15: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

1. Viruses and WormsA Virus is a “program that is loaded onto your com-

puter without your knowledge and runs against your wishes Solution:

Install a security suite that protects the computer against threats such as viruses and worms.

Page 16: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

2. H o w To p r e v e n t h a c k i n gIt may be impossible to prevent computer hacking,

however effective security controls including strong pass-words, and the use of firewalls can helps.3. M a l w a r e The word "malware" comes from the term "MALicious softWARE."

Page 17: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

3. M a l w a r e ( c o n t . )Malware is any software that infects and damages a

computer system without the owner's knowledge or permis-sion.

To S t o p M a l w a r e• Download an anti-malwar program that also

helps prevent infections.• Activate Network Threat Protection, Firewall, Antivirus.

Page 18: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

4. Trojan Horses Trojan horses are email viruses that can duplicate

themselves, steal information, or harm the computer sys-tem.

These viruses are the most serious threats to computers

H o w t o Av o i d Tr o j a n s Security suites, such as Avast Internet Security, will pre-

vent you from downloading Trojan Horses.

Page 19: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

5. Password Cracking

Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.

Securing Password Use always Strong password. Never use same password for two different sites.

Page 20: Cyber crimes and security

Cyber SecurityMajor security problems and solutions

5. Password Cracking

Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.

Securing Password Use always Strong password. Never use same password for two different sites.

Page 21: Cyber crimes and security

Cyber SecuritySafety tips to Cybercrime

• Use antivirus software’s • insert firewalls (A firewall is a network security system, either hardware- or software-based, that uses rules to

control incoming and outgoing network traffic.)

• uninstall unnecessary software • maintain backup • check security settings

Page 22: Cyber crimes and security

Cyber SecuritySafety tips to Cybercrime

• Never give your full name or address to strangers • Use strong passwords , don’t give personal information un-

less required• Open attachments carefully• Learn more about Internet privacy

Page 23: Cyber crimes and security

Cyber SecurityAdvantages of cyber security

• The cyber security will defend us from critical attacks.• It helps us to browse the safe website. • Internet security process all the incoming and outgoing data

on our computer.• Security will defend from hacks and virus.• The application of cyber security used in our PC needs

update every week. • The security developers will update their database every

week once. Hence the new virus also deleted

Page 24: Cyber crimes and security

AnyQuestion???

Page 25: Cyber crimes and security