The Best Way To Secure U R Self

Slides:



Advertisements
Similar presentations
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Advertisements

© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
Discovering Computers 2010
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
CYBER CRIME.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CYBER CRIMES Know how's of cyber crimes. I’M HERE………
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Safety.
Securing Information Systems
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Add video notes to lecture
To Know what Cyber crime is
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Homeland Security: Computer Protection
Seminar On Cyber Crime Submitted To: Submitted By:
Home Computer Security
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Securing Information Systems
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
What is Web Browsers - What is Blogs-
HOW TO DOWNLOAD THE LATEST VERSION OF AVAST ANTIVIRUS FOR FREE?
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Ethics.
Staying safe on the internet
Prepared By : Binay Tiwari
Understanding Browsers
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
WJEC GCSE Computer Science
Lesson 2- Protecting Yourself Online
Privacy, Security, and Ethics
INTERNET SECURITY.
Presentation transcript:

The Best Way To Secure U R Self Cyber crimes and self protection The Best Way To Secure U R Self Is To Hack U R Self

Cyber crime A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. Types: Crimes against individual Crimes against society Crimes against organization Crimes against property

First cyber crime The first recorded cyber crime took place in the year 1820! In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of speci al fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Theft Real-world theft: Possession of property shifts completely from A to B, i.e., A had it now B has it Theft in Virtual-world (Cyber-theft): Property is copied, so A “has” it and so does B

Types of attacks Unauthorized access Denial of service attack Virus, Worms and Trojan attacks Email Bombing Internet Time Thefts Web Jacking Theft and Physical damage of computer or its peripherals

Top online scams The Phishing e-mail scam The Money laundering scam Greeting card scam A Guaranteed Bank loan or Credit card Scheme Lottery Scam Hit man Scam Romance Scam Fake Antivirus Software Facebook Impersonation Scam Make Money Fast

Top online scams

List of Cyber Crimes registered in India Year Head 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Motive 378 201 481 422 459 464 682 1322 2213 3477 5693 Suspect 296 191 363 IPC 738 411 279 302 311 339 176 276 356 601 1337 IT-Act 70 60 68 179 142 217 288 420 966 1791 2876 4356 TOTAL 1482 863 347 1443 1297 1378 1392 2060 3966 6639 10431 17079

Self Protection Phishing and spam Mail identification Antivirus Password Website URL

Phishing and spam mail Identification

Antivirus Purchase a genuine Anti Virus The antivirus should have Internet Security Update the Antivirus regularly. Never Allow files like Trojan.exe/ Worm.exe

Website URL Use always Https:// instead of Http:// Never Save Password for quick access.

Password Set a Unique password for different sites/ Logins. Password should be combination of Alphanumeric and Special Characters. Use different security answer for different questions.

SQL injection SQL- Structured Query language. SQL is a computer language that you use to interact with a database. Database is collection of data. SQL is a tool for organizing, managing, and retrieving data stored by a computer database.

Hacking a website using SQL injection Step 1: Finding Vulnerable Website Step 2: Checking the Vulnerability Step 3: Finding Number of columns Step 4: Displaying the Vulnerable columns Step 5: Finding version, database, user Step 6: Finding the Table Name Step 7: Finding the Column Name Step 8: Finding the Admin Panel