Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber crime & Security Prepared by : Rughani Zarana.

Similar presentations


Presentation on theme: "Cyber crime & Security Prepared by : Rughani Zarana."— Presentation transcript:

1 Cyber crime & Security Prepared by : Rughani Zarana

2 What is cyber security?  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Though, cyber security is important for network, data and application security.

3 What is…?  Communication security-protecting organization communication media, technology, and content.  Network security-is the protection of networking components, connection and content.  Information security-protection of information and its critical elements, including the systems and hardware that use, store or transmit that information.

4 What is cyber crime?  Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

5 History  The first cyber crime was recorded in the year 1820.  The first spam email took place in 1978 when it was sent over the Arpanet.  The first Virus was installed on an Apple Computer in 1982.

6 Cyber crimes includes  Illegal access  Illegal Interception  System Interference  Data Interference  Misuse of devices  Fraud

7 Types of Cyber attacks, by percentage (source- FBI)  Financial fraud: 11%  Sabotage of data/networks: 17%  Theft of proprietary information: 20%  System penetration from the outside: 25%  Denial of service: 27%  Unauthorized access by insiders: 71%  Employee abuse of internet privileges 79%  Viruses: 85%

8 Categorize of Cybercrime  The Computer as a Target :  using a computer to attack other computers.  The computer as a weapon :  using a computer to commit real world crimes.

9 Types of cyber crime  HACKING  DENIAL OF SERVICE ATTACK  VIRUS DISSEMINITION  COMPUTER VANDALISM  CYBER TERRORISM  SOFTWARE PIRACY

10 Hacking  Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING.  Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.

11 DENIAL OF SERVICE ATTACK  This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

12 VIRUS DISSEMINITION  Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks.  (virus, worms, Trojan Horse, web jacking, e-mail bombing etc).

13 COMPUTER VANDALISM  Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate.

14 CYBER TERRORISM  Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc.  Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

15 SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

16 Why should we care?  It is a criminal activity committed on the internet.  Cyber crime-Where computer is either a tool or target or both.

17 How can we protect?  Read Privacy policy carefully when you submit the data through internet.  Encryption: lots of website uses SSL (secure socket layer)to encrypt a data.  Disable remote connectivity.

18 Advantage of cyber security  It will defend from hacks and virus.  The application of cyber security used in our PC needs update every week.  The security developers will update their database every week once. Hence the new virus also deleted.

19 Safety tips …  Use antivirus software  Insert firewalls, pop up blocker  Uninstall unnecessary software  Maintain backup  Check security settings  Use secure connection  Open attachments carefully  Use strong passwords, don’t give personal information unless required

20 CYBER LAW OF INDIA  Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.  The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.

21 Conclusion  The only system which is truly secure is one which is switched off and unplugged.  So, only way to be safe is Pay attention and Act smart.

22

23 THANK YOU


Download ppt "Cyber crime & Security Prepared by : Rughani Zarana."

Similar presentations


Ads by Google