Cyber Crime and Cyber Security

Post on 10-Jan-2017

315 views 6 download

Transcript of Cyber Crime and Cyber Security

CYBER SECURITYPRESENTING BY:

KAZI SAZED SALMAN ID: 2015210001045MUSTARY UMMA ASHA ID:

2015210001029

slideshare.net/ssalman69

WHAT IS CYBER SECURITY

Cyber security is the protection of computer & network systems for preventing - • Theft•Damage to the hardware & software•Misdirection of the information

WHY CYBER SECURITY IS IMPORTANT

• To ensure data protection•Restrict unauthorized users• Prevent losing data• Ensuring privacy & confidentiality• To keep safe from the cyber crime

WHAT IS CYBER CRIME

• Crime committed using a computer and the internet to steal data or information.• Illegal imports.• Malicious programs.

A FEW REMARKABLE HISTORIES

1971 – John Draper builds a ‘blue box’ that reproduces a 26kHz tone, which allows to make free calls.

1981 – Ian Murphy, becomes first convict of a computer crime, broke into a super shop’s computers and changed the billing clock so that people receive discounted rates during normal business hours.

1986 – “Brain” the first standard computer virus released.

1988 – National Bank of Chicago, first victim of $70-million computer theft.

1991 – Kevin Poulsen was captured for selling military secrets

1994 – A 16 year old UK student, got arrested for accessing computers at the Korean Atomic Research Institute, NASA and several US govt. agencies.

1996 – Russian cracker attempts to extort $100K from thousands of customers' credit card numbers

2007 – First cyber warfare in Estonia2010 – WikiLeaks released Iraq War documents

and Afghan War documents

A FEW REMARKABLE HISTORIES (CONT.)

CYBERCRIMES IN 2013

RECENT ATTACK IN BANGLADESH

• In February 2016, US$951 million had been illegally transferred from Bangladesh Bank.• Issued via the SWIFT network. • Withdrawn from a Bangladesh Bank account at the

Federal Reserve Bank of New York.• $20 million traced in Sri Lanka (since recovered) and

$81 million in the Philippines (about $18 million recovered). • The Federal Reserve Bank of NY blocked the

remaining thirty transactions, amounting to $850 million, at the request of Bangladesh Bank.

TYPES OF CYBER CRIME

A.HackingB.Theft / PiracyC.Cyber stalking (spying)D.Identity theftE.Malicious programF. Child soliciting & abuse

HACKING

• A person’s computer is broken into so that his personal or sensitive information can be accessed.• A hacker uses a variety of

software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location slideshare.net/ssalman69

THEFT / PIRACY

• Copyright infringement (piracy) occurs when a person violates copyrights and downloads music, movies, games and software.• The owner of the copyright

gets no monetary value of his work from the pirated users.

CYBER STALKING

• This is a kind of online harassment wherein the victim is subjected to a barrage of online messages, emails & pictures by the stalker.• Typically, these stalkers

know their victims and they use the internet to stalk & spy.

IDENTITY THEFT

• A criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to withdraw money or to buy things online in the victim’s name.• It can result in major financial

losses for the victim and even spoil the victim’s credit history.

MALICIOUS SOFTWARE

• The software is used to gain access to a system to steal information or data or causing damage to other software or data present in the system• These can be Internet-

based software or programs that are used to disrupt a network

TYPES OF CYBER ATTACK

Financial fraud: 11%Sabotage of data/networks: 17%Theft of proprietary information: 20%System penetration from the outside: 25%Denial of service: 27%Unauthorized access by insiders: 71%Employee abuse of internet privileges 79%Viruses 85%

CYBER SECURITY STAGES

PersonalSecurity

Organizational

Security

NationalSecurity

PERSONAL SECURITY

• Never click on unknown links in emails.• Do not give out personal information.• Use recommended antivirus.• Do not run non-familiar application.• Keep information private in the social media.• Keep operating system, browser, anti-virus

and other critical software up to date.

ORGANIZATIONAL SECURITY

• Cloud Backup & Pay for Premium Cloud Security• Call in an IT Security Consultant when needed• Don’t let employees download any software

without permission• Never share official files in social media• Use portable drives with care• Use business level antivirus software

NATIONAL CYBER SECURITY

• Constructing & applying proper laws for cyber crime• Confidential files should be shared with high

care• Protect national bandwidth from being

abused• Taking proper steps to prevent hackers &

piracy• Giving high priority on the development of IT

sector

THANKS EVERYONE…

IF YOU HAVE ANY QUERY, PLEASE FEEL FREE TO ASK.

slideshare.net/ssalman69