CYBER CRIME& SECUIRITY

Slides:



Advertisements
Similar presentations
Breaking Trust On The Internet
Advertisements

© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Cyber Crime.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
presentation topic : cyber crimes and security By ashwini awatare
Cyber Crimes Mumbai Police. Why do we need to know about this Everybody uses computers Crimes like forgery, extorion, kidnapping, are all being assisted.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
CYBER SECURITY “LETS FIGHT AGAINST CYBER CRIME” Tanya Drummond Shamia Tooson John Fashakin Alexander Skiba.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
Chap1: Is there a Security Problem in Computing?.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
CLICKTECHSOLUTION.COM.  INTRODUCTION  HISTORY OF CYBER CRIME  CATEGORIES OF CYBER CRIME  TYEPS OF CYBER CRIME  CYBERCRIMES THREATENS NATIONAL SECORITY.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
What is Cybercrime? Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs Cybercrime.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Technical Implementation: Security Risks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Cyber crime and security issues
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
The Best Way To Secure U R Self
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Unit# 7: Future Enabling use of ICT
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

CYBER CRIME& SECUIRITY PRESENTED BY:- Pushpal Ganguly

What is

Crime committed using a computer & internet to steal a person’s identity or illegal imports or malicious programs. Cyber Crime is nothing where the computer used as an object or subject of crime. Online activities are just like vulnerable to crime & can compromise personal safety just as effectively as common everyday crime. Lawmakers and individuals should know how to protect themselves and the persons for which they are responsible.

History of cyber crime! First recorded cyber crime took place in 1820 at Joseph-Marie Jacquard a French textile manufacturer. Device allowed repetition series of steps in the weaving of special fabrics . Resulting a fear among employees that there traditional employment & livelihood were being threatened. In India , Japan & China era of modern computers begins with the analytical engine of Charles Babbage. First Spam email took place in 1978 at ARPANET (Advanced Research Projects Agency Network) The first virus was installed on an Apple computer in the year 1982 when a high school student R Skrenta develop the Elk Cloner.

Categorize OF

We can categorize Cyber Crime in two ways :- The Computer as a target :- Using Computers to attack other computers e.g. Hacking , Email bombing, Data Dibbling, Virus worm attack etc. The Computer as a Weapon:- Using a computer to commit real world crimes such as cyber terrorism. IPR violations, Credit card frauds, Pornography etc. Cyber Crimes are regulated by cyber laws or internet laws.

Types of Cyber Crime 1. HACKING Hacking in simple terms means an illegal intrusion into a computer system & network. It is also known as CRACKING. Govt websites are the hot targets of hackers due to press coverage. E.G. recent hacking of CBI website by two Pakistani hackers had turn the CBI top boss red-face & nightmare which totally unnerved the Indian Security agencies . Motive behind Hacking Mainly Greed Power Publicity, Revenge Adventure desire to access Forbidden information etc.

2. CHILD PORNOGRAPHY The Internet is being highly used by its abusers to sexually abuse children worldwide. As more homes have access to internet so more children are using the net & thus more chance of them falling victim to it. Nowadays it is happening to adult women as well mainly between the age group 21-35. How they operate :- Using false identity in chat rooms & social networking sites like Orkut & Facebook they trap victims by first making friendship with the victim & then after winning there confidence steal their personal information by hacking into their account.

3.DATA DIDDLING Altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.

4.SALAMI ATTACKS Used for the commission of financial crimes. Key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

5.DENIAL OF SERVICE ATTACK This is the act by criminals who flood the bandwidth of the victims network or fills his email box with spam emails depriving him of service he is entitle to access or provide.

6. CYBER TERRORISM Terrorist attacks on the internet is by distributed denial of service attacks attacking websites, attacking emails, attacks on sensitive computer networks etc. Technology Savvy terrorist are using 512 bit encryption which is almost impossible to decrypt by security agency. Terror outfits like Al-Qaida, Laskare-Toiba, Indian Mujahidin etc are using internet as their important tool to conduct their missions. There are many online communities & blogs available through which they carry out their recruiting process spreading the message of Jihad by interpreting it wrongly to innocent minds turning them to dreadful Terrorist.

7.VIRUS ATTACKS Programs that attach themselves to a computer or a file Circulate themselves to other files and to other computers on a network Affect the data on a computer, either by altering or deleting it

WORM ATTACKS Do not need the host to attach themselves to. Make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.

WEB JACKING Occurs when someone forcefully takes control of a website (by cracking the password and later changing it).

Cyber Crime Threatening National Security Ex Union Home Minister Shibraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. In today's age when everything from small gadgets to nuclear plants are operated by computers cyber crime is threatening ramification . Cyber Crimes are capable of breaching the security of the most vital installations. Social Networking sites like Orkut & Facebook are the main platform for terror outfits to create communities , fan clubs through which they spread the message of terror. Thus it is advisable not to join any communities, fan clubs, pages, without knowing about them in details even if the invitation is send from your near & dear ones.

Cyber Security Cyber security involves protection of sensitive personal & business data through prevention, detection & response to different online attacks. Privacy Policy:- Before submitting your name, mail id or any other information on a website look for the sites privacy policy. To protect your information from hackers you should encrypt your data. Many Sites uses SSL layers(secure socket layers) to encrypt information thus protecting your privacy.

Protect your Computers Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist Don’t share access to your PC with strangers. Don’t add unknown friends in Orkut & Facebook keep changing your password in every 6 months .

THANKS!!!