23
3/22/2015 1

cyber crime and security

Embed Size (px)

Citation preview

Page 1: cyber crime and security

3/22/2015 1

Page 2: cyber crime and security

3/22/2015 2

Page 3: cyber crime and security

what Is ….CYBER

CRIME.

HiStory of Cyber Crime.

Cyber Criminals.

tYpes of Cyber Crimes.

saFEty tips for Cyber Crime.

Cyber security.

cYBer seCUrity gLOSsarY TeRMs.

aDvanTages anD dIsadvAnTAges of Security.

ConclUSions.

rEferenCes…

.

3/22/2015 3

Page 4: cyber crime and security

• Encompasses Criminal Act.

• Dealing with Computers and Networks.

• Also called COMPUTER CRIME.

Eg.-> Internet fraud, credit card account thefts etc.

3/22/2015 4

Page 5: cyber crime and security

• The first recorded cyber crime took place in year 1820.

• The first spam email took place in 1978 when it was send over the

Arpanet.

•The first VIRUS was installed on an Apple computer in 1982.

…HISTORY OF CYBER

CRIME…

3/22/2015 5

Page 6: cyber crime and security

3/22/2015 6

Page 7: cyber crime and security

1. INTRUSION.2. CYBER STALKING.3. IDENTITY THEFT.4. SOCIAL ENGINEERING.5. CYBER PORNOGRAPHY.6. PHREAKING.7. WEB JACKING etc.

3/22/2015 7

Page 8: cyber crime and security

PROTECT YOUR E-IDENTIY.

BE SOCIAL MEDIA SAVVY.

CAUTIOUSLY TREAT UNSOLICITED E-MAILS.

REPORT SUSPICIOUS ACTIVITIES.

LOCK YOUR COMPUTER.

KEEP PRIVATE INFORMATION

PRIVATE.

CHECK SECURITY SETTINGS.

3/22/2015 8

Page 9: cyber crime and security

3/22/2015 9

Page 10: cyber crime and security

3/22/2015 10

Page 11: cyber crime and security

Access −

The ability and means to communicate with asystem.

Active Attack −

An actual assault perpetrated by an intentionalthreat source.

3/22/2015 11

Page 12: cyber crime and security

Blacklist −

A list of entities that are blocked or deniedprivileges or access.

Bot −

A computer connected to the Internet that hasbeen secretly compromised with malicious logic.

3/22/2015 12

Page 13: cyber crime and security

Critical Infrastructure −

The systems and assets, whether physical orvirtual, so vital to society that the destruction mayhave a debilitating impact.

Cryptography −

The use of mathematical techniques to provide security services, such as confidentiality.

3/22/2015 13

Page 14: cyber crime and security

Cyber Space −

The interdependent network of informationtechnology infrastructures.

Data Breach −

The disclosure of sensitive information to a party,usually outside the organization, that is notauthorized to have or see the information.

3/22/2015 14

Page 15: cyber crime and security

Intrusion Detection −

The process and methods for analyzinginformation from networks and informationsystems .

Key −

The numerical value used to controlcryptographic operations.

3/22/2015 15

Page 16: cyber crime and security

Defend us from Critical Attacks.

Protects system against viruses, worms, spyware and

other unwanted programs.

Protection against data from theft.

Protects the computer from being hacked.

Minimizes computer freezing and crashes.

Gives privacy to users.

3/22/2015 16

Page 17: cyber crime and security

Firewalls can be difficult to configure correctly.

Incorrectly configured firewalls may block usersfrom performing certain actions on the Internet,until the firewall configured correctly.

Makes the system slower than before.

Need to keep updating the new software in orderto keep security up to date.

Could be costly for average user.

3/22/2015 17

Page 18: cyber crime and security

3/22/2015 18

Page 19: cyber crime and security

3/22/2015 19

Page 20: cyber crime and security

... “ILLUSION OF IDEAS LEADS TO

BETTER INNOVATION

BUT MISUSING IT ALWAYS MOVE IT IN

DIRECTION OF DESTRUCTION”…

3/22/2015 20

Page 21: cyber crime and security

www.bovill.com

CYBER FORENSICS.

-BY: ALBERT G.MARCELLA.

DIGITAL FORENSICS AND CYBER CRIMES .

-BY: SPYRINGER.

www.ehow .com

www.timesofindia.com

www.hackersnews.com

www.opentech.com

www.intergraphgovsolutions.com

3/22/2015 21

Page 22: cyber crime and security

3/22/2015 22

Page 23: cyber crime and security

3/22/2015 23