cyber security “lets fight against cyber crime” tanya drummond shamia tooson john fashakin...
TRANSCRIPT
CYBER SECURITY
“LETS FIGHT AGAINST CYBER CRIME”
Tanya DrummondShamia ToosonJohn Fashakin
Alexander Skiba
AGENDA Brief overview on cybersecurity and some history Cybercrime and some common types Why is cybersecurity important? Practical personal and business cybersecurity measures
Cyber Security refers to the technologies and processes designed to
protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the internet by cyber
criminals.
WHAT IS CYBER SECURITY?
Communication security-protecting organization communication technology, media and content.
Network Security- is the protection of networking components, connection and content.
Information Security- The protection of information and its critical elements. This includes the systems and hardware that uses, stores, or transmits information.
OTHER TYPES OF SECURITY INCLUDES…..
The first recorded cyber crime took place in 1820
The first Virus was installed on an Apple computer in 1982 when a high school student developed the EIK Cloner
The first Spam email took place in 1978 when it was sent over the Arpanet
HISTORY AND INTERESTING FACTS
Robert Tappan Morris created the first worm and sent it from MIT to the web and caused $50.000 worth of damages
In 1994 Vladimir Levin intruded an American bank computer and stole 10 million dollars
In 1999 Jonathan James hacked into a NASA computer and had access to data worth over 1.7 million dollars.
46% of companies have admitted to suffering financial losses due to security incidences. The total amount in 2013 was $781.84 million.
HISTORY AND INTERESTING FACTS CONTINUED……
Crime committed using a computer and the internet to steal data or information. The computer is used as an object or subject of a crime.
The computer could be the target of Cybercrime. Examples: Hacking, virus/worm attacks, DOS attacks ect.
The Computer can be used as a weapon to facilitate cyber crime. Examples: Cyber terrorism, Credit card fraud ect
Illegal Imports such as copyright violation. Which is material copied from sources that are not public domain or compatibly licensed without the permission of copyright holder. Causes legal issues
Malicious programs
CYBER CRIME
HACKING
DENIAL OF SERVICE ATTACK
VIRUS DISSEMINATION
COMPUTER VANDALISM
CYBER TERRORISM
SOFTWARE PIRACY
FRAUD
TYPES OF CYBER CRIMES
Hacking means an illegal intrusion into a computer system and/or network
Also known as CRACKING
Government websites are the hot target of hackers due to the type of press coverage it receives.
Main motives for hackers are publicity, revenge, adventure, desire to access forbidden information, overall destructive mindset
HACKING
This act is committed by the criminal, who floods the bandwidth of the victims
network or fills ones e-mail box with spam mail depriving an individual of
services they are entitled to access or provide.
DENIAL OF SERVICE ATTACK
Damaging or destroying data rather than stealing or misusing them is called
cyber vandalism.
These are programs that attach themselves to a file and then circulate by some
channel like email.
COMPUTER VANDALISM
Terrorist attacks on the internet is by distributed denial of service attacks, hate
websites and hate emails, attacks on sensitive computer networks. Terrorists
that are extremely technology savvy are using 512-bit encryption which is
impossible to decrypt.
CYBER TERRORISM
Theft of software through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for the original.
SOFTWARE PIRACY
Malicious software that attaches itself to other software. VIRUS, WORMS,
TROJAN HORSE, WEB JACKING, EMAIL BOMBING ect are all examples.
VIRUS DISSEMINATION
Credit card fraud is the misuse of a credit card to make purchases without authorization or counterfeiting a credit card.
Types of credit card fraud are online credit card fraud, advance payments, stolen card numbers.
The lack of face-to-face or voice interaction on the Internet provides fraudsters anonymity.
Some thieves may go through the trash to find billing statements then use account information to buy things.
Advanced payment is someone using a forged or counterfeit check, then an advance or overpayment is made on a stolen credit card. Because the issuer must credit the payment at the time it is made, there is no time to verify the authenticity of the check.
FRAUD
Internet security is a branch of computer security specifically related to the internet.
Remember, cybersecurity's objective is to establish rules and measure to use against attacks over the internet.
WHY CYBERSECURITY?
VIDEO
Defend us from critical attacks
It helps us browse safe websites
Internet security processes all the incoming and outgoing data on our computer
Security will defend us from hacks and viruses
ADVANTAGES OF CYBER SECURITY
Use antivirus software's and keep them up to date!
Insert firewalls
Uninstall unnecessary software
Maintain backup
Check security settings
NEVER give your full name or address to strangers
Learn more about internet privacy
SECURITY
Keep your operating system up to date with critical security updates and patches
Never open emails or attachments from unknown sources
Use hard to guess passwords. Try not to use words found in the dictionary. PASSWORD CRACKING TOOLS DO EXIST!
Back up your computer data on disks or cds often
PROTECT WIFI PASSWORD
DON’T share access to your computers with strangers
SECURITY CONTINUED
For hardware: Tamper-resistant devices, operate a TCB, hardware watermarking
For software: Secure coding practice, code obfuscation, secure design and development, formal methods
For network: Firewall, intrusion prevention and detection, VPN, encryption
SECURITY FOR BUSINESS
As internet technology advances so does the threat of cyber crime. WE MUST PROTECT OURSELVES FROM CYBER CRIME.
So BE SAFE, AND LETS EDUCATE OURSELVES when it comes to cyber security.
CONCLUDING REMARKS
TREAT YOUR PASSWORD LIKE YOU TREAT YOUR TOOTHBRUSH. NEVER GIVE IT TO ANYONE ELSE TO
USE AND CHANGE IT EVERY FEW MONTHS.
LAST WORDS
REFERENCES"2014 State of Risk Report." Trustwave, 1 Jan. 2014. Web. 6 Apr. 2015.
<https://www2.trustwave.com/rs/trustwave/images/2014_TW_StateofRiskReport.pdf>.
Balan, Lăcrămioara, AND Popescu, Mihai. “Credit card fraud” The USV Annals of Economics and Public Administration [Online], 11 9 Sep 2011.
Conner, Marcia. "Data on Big Data." Marc!a Conner. 18 July 2013. Web. 6 Apr. 2015.
Cybersecurity Basics - Level 3 Whiteboard Video. Level 3 Communications, 2012. Film.
REFERENCES CONT.Hansen, L. and Nissenbaum, H. (2009), Digital Disaster, Cyber Security, and the
Copenhagen School. International Studies Quarterly, 53: 1155–1175. doi: 10.1111/j.1468-2478.2009.00572.x
Jang-Jaccard, Julian, and Surya Nepal. "A Survey Of Emerging Threats In Cybersecurity." Journal Of Computer And System Sciences 5 (2014): 973. Academic OneFile. Web. 14 Apr. 2015.
Roeder, D. Bruce. "Cybersecurity." Military Review 92.3 (2014): 38-42. MasterFILE Elite. Web. 14 Apr. 2015.
Schiff, Jennifer L. "6 Biggest Business Security Risks and How You Can Fight Back." CIO. CIO, 20 Jan. 2015. Web. 6 Apr. 2015.
Superior Ecommerce Analytics. Digital image. Evermerchant. 1 Jan. 2015. Web.
REFERENCES CONT.Walters, Riley. "Cyber Attacks on U.S. Companies in 2014." The Heritage
Foundation. The Heritage Foundation, 27 Oct. 2014. Web. 2 Apr. 2015.