cyber crimes and security
TRANSCRIPT
By:
Cyber CrimesAnd
Security
Ibtsam RanaAnd
Ali Kainth
Cyber CrimeWhat is Cyber ???
"Cyber" is a prefix used to describe a person, thing, or idea as part of the computer and information age.
What is Cyber Crime ???
Cybercrime, also called computer crime, is any illegal activ-ity that involves a computer or network-connected device, such as a mobile phone.
• The first recorded cyber crime was recorded in the year 1820.• The first spam email took place in 1978 when it was sent over the Arpanet.• The first Virus was installed on an Apple Computer in 1982.
Cyber Crime
History
Cyber Crime
Categorize of Cybercrime
• The Computer as a Target : using a computer to attack other computers. • The computer as a weapon : using a computer to commit real world crimes.
Cyber CrimeTypes of Cybercrime
• HACKING• CHILD PORNOGRAPHY• DENIAL OF SERVICE ATTACK• VIRUS DISSEMINITION• COMPUTER VANDALISM• CYBER TERRORISM• SOFTWARE PIRACY
Who are Hackers???In common a hacker is a person who breaks into computers, usu-
ally by gaining access to administrative controls.
Types of Cybercrime
What is Hacking ???
Unauthorized access of any System is called hacking.
Types of hackers
• Black hat hackers• White hat hackers• Gray hat hackers
Types of Cybercrime3. DENIAL OF SERVICE ATTACK( DoS Attacks)
Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, Trojan Horse, web jacking etc. are examples)
4. VIRUS DISSEMINITION
This is an act by the criminal, who floods the bandwidth of the victims net-work or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
Cyber Threat Evolution
Types of Cybercrime
5. COMPUTER VANDALISM
Computer vandalism is a type of malicious behavior that involves damages computers and data in various ways and potentially disrupting businesses. Typical computer vandalism involves the cre-ation of malicious programs and damage the password or hard disk.
6. CYBER TERRORISM
Cyber terrorism is the terrorism using internet, computer or electronic things. In this way terrorists shares hate data over the internet or share wrong information. A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption.
Types of Cybercrime
7. SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
CyberSecurity
Cyber SecurityWhat is Cyber Security???
Cyber security refers to the technologies and processes de-signed to protect computers, networks and data from unautho-rized access and attacks delivered via the Internet by cyber criminals.
Cyber SecurityMajor security problems and solutions
Virus
Hacker
Malware
Trojan horses
Password cracking
Cyber SecurityMajor security problems and solutions
1. Viruses and WormsA Virus is a “program that is loaded onto your com-
puter without your knowledge and runs against your wishes Solution:
Install a security suite that protects the computer against threats such as viruses and worms.
Cyber SecurityMajor security problems and solutions
2. H o w To p r e v e n t h a c k i n gIt may be impossible to prevent computer hacking,
however effective security controls including strong pass-words, and the use of firewalls can helps.3. M a l w a r e The word "malware" comes from the term "MALicious softWARE."
Cyber SecurityMajor security problems and solutions
3. M a l w a r e ( c o n t . )Malware is any software that infects and damages a
computer system without the owner's knowledge or permis-sion.
To S t o p M a l w a r e• Download an anti-malwar program that also
helps prevent infections.• Activate Network Threat Protection, Firewall, Antivirus.
Cyber SecurityMajor security problems and solutions
4. Trojan Horses Trojan horses are email viruses that can duplicate
themselves, steal information, or harm the computer sys-tem.
These viruses are the most serious threats to computers
H o w t o Av o i d Tr o j a n s Security suites, such as Avast Internet Security, will pre-
vent you from downloading Trojan Horses.
Cyber SecurityMajor security problems and solutions
5. Password Cracking
Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
Securing Password Use always Strong password. Never use same password for two different sites.
Cyber SecurityMajor security problems and solutions
5. Password Cracking
Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
Securing Password Use always Strong password. Never use same password for two different sites.
Cyber SecuritySafety tips to Cybercrime
• Use antivirus software’s • insert firewalls (A firewall is a network security system, either hardware- or software-based, that uses rules to
control incoming and outgoing network traffic.)
• uninstall unnecessary software • maintain backup • check security settings
Cyber SecuritySafety tips to Cybercrime
• Never give your full name or address to strangers • Use strong passwords , don’t give personal information un-
less required• Open attachments carefully• Learn more about Internet privacy
Cyber SecurityAdvantages of cyber security
• The cyber security will defend us from critical attacks.• It helps us to browse the safe website. • Internet security process all the incoming and outgoing data
on our computer.• Security will defend from hacks and virus.• The application of cyber security used in our PC needs
update every week. • The security developers will update their database every
week once. Hence the new virus also deleted
AnyQuestion???